Cyber 360
Security Briefing from Cyber Security Experts
How Internet of Things Pose as Cyber Threats in 2018

Society has become increasingly technology dependent. How many people do you know who have a smart phone or wear some sort of fitness tracker like a FitBit? Most of these devices collect, store, and provide data through internet connections. Unfortunately, this happens all too often without you necessarily knowing it. In addition, many of these devices lack basic online safety measures, which makes them susceptible to hacking. This lack of security leaves individuals increasingly vulnerable to cyber threats. Here are several threats to keep an eye on for 2018 as they related to internet of things (IOT).
Networking
With the increased connectivity associated with such devices as fitness trackers and smart phones, individuals are actually providing a network of devices that hackers can exploit. For example, the FitBit tracker has a central database that stores your step data, but also has the ability to synchronize up with other individuals who also use a FitBit. Individuals can compete against each other on a weekly basis for whoever can achieve the most steps. That connectivity can be a gateway for hackers to get not just your data, but also your friends and other users that you share FitBit data with. Additionally, since you most likely synchronize your FitBit to your phone, there is that connection that can now be exploited by a hacker.
Greater Increase in Targeted Attacks on IOT devices
Over the years, there has been an increase in cyber thieves and hackers attacking the vulnerabilities found in networked devices. Since everything from home security systems and internal house controls such as the thermostat and lighting are networked, they provide an enticing avenue for thieves to exploit. This is because many of these systems do not have basic security built in to protect the devices against online attacks. Additionally, since many of these devices do not require a password, they are literally wide open for hackers to take advantage of.
Exploiting Online Data
Recently an article came out about how FitBit tracking metadata had the potential to be exploited by cyber thieves and even terrorists. It turns out that the military had pushed an initiative that aimed at making troops more fit and healthy by providing them with fitness trackers. Recent photographs have come to light showing how FitBit metadata appears online and can show the most common routes taken by troops in specific areas. This is a prime example of online data that many users did not even know was available online.
The Internet of Things is providing more and more opportunities for cyber thieves to gain access to vulnerable systems. Given the increase in user interactions with these types of devices, it would seem we will be seeing more occurrences of cyber threats in 2018.
Recommended Posts

Ukraine Cyber Attack
July 11, 2018

Hacking the Boardroom
July 11, 2018

Blockchain and its uses in Cyber Security
February 25, 2018