Smart but vulnerable devices
With the name smart or smart in English we call any device
or device connected to the Internet. This implies that, inside, it has a
minicomputer or a motherboard with certain advanced functions that are the ones
that endow it with that intelligence.
But that intelligence is not active, that is, it depends on
how the manufacturer and its subsequent owner program it.
We have been living with computers for several decades and
the love-hate relationship allows many of us to be aware of how they facilitate
many tasks but the dangers of having Internet connected constantly without
security measures (such as a firewall or antivirus) and without updating the
software assiduously.
The same goes for mobile devices. Android is the main victim
of mobile malware and basically affects outdated smartphones. Not only smart
phones, but also televisions or other devices with Android installed.
We have recently seen what happens when the connected
technology is not up to date. The Winery ransomware attack took advantage of a
Windows vulnerability that had been discovered the previous month.
Attacks of this kind do not involve the use of magic. They
simply take advantage of the holes in the form of obsolete software that the
connected devices have.
And here lies the main security problem of the Internet of
Things: smart devices but with obsolete software.
The main cause is the very nature of these devices. We
recently lived with them and, while updating a PC or a smartphone is relatively
simple, the same thing does not happen with a device designed to work and that
does not require maintenance at the software level by the user.
Connected devices can serve a botnet to attack large
companies or public institutions
Does this mean that anyone can access connected devices of a
home automation and take control without stepping on the floor of my house? It
is not as easy as it seems but it is possible.
Another example: on the Internet you will find with relative
ease pages that collect images from webcams around the world. Private cameras,
some of private homes, which as they have not changed the default password,
share their images with everyone.
Comments
Post a Comment