Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    COFFEE_KLATSCH    |    Gossip and chit-chat echo    |    2,835 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 1,696 of 2,835    |
|    Roger Nelson to All    |
|    Malwarebytes    |
|    21 Dec 17 22:02:47    |
      Internet of Things (IoT) security: what is and what should never be               101 | Hacking | How-tos       Internet of Things (IoT) security: what is and what should never be               Posted: December 6, 2017 by Wendy Zamora               The Internet has penetrated seemingly all technological advances today,       resulting in Internet for ALL THE THINGS. What was once confined to a desktop       and a phone jack is now networked and connected in multiple devices, from home       heating and cooling systems like the Nest to AI companions such as Alexa. The       devices can pass information through the web to anywhere in the world-server       farmers, company databases, your own phone. (Exception: that one dead zone in       the corner of my living room. If the robots revolt, I'm huddling there.)               This collection of inter-networked devices is what marketing folks refer to as       the Internet of Things (IoT). You can't pass a REI vest-wearing Silicon Valley       executive these days without hearing about it. Why? Because the more we send       our devices online to do our bidding, the more businesses can monetize them.       Why buy a regular fridge when you can spend more on one that tells you when       you're running out of milk?               Internet of Things               Unfortunately (and I'm sure you saw this coming), the more devices we connect       to the Internet, the more we introduce the potential for cybercrime. Analyst       firm Gartner says that by 2020, there will be more than 26 billion connected       devices-excluding PCs, tablets, and smartphones. Barring an unforeseen Day       After Tomorrow-style global catastrophe, this technology is coming. So let's       talk about the inherent risks, shall we?       What's happening with IoT cybercrime today?                Both individuals and companies using IoT are vulnerable to breach. But how       vulnerable? Can criminals hack your toaster and get access to your entire       network? Can they penetrate virtual meetings and procure a company's       proprietary data? Can they spy on your kids, take control of your Jeep, or       brick critical medical devices?               So far, the reality has not been far from the hype. Two years ago, a smart       refrigerator was hacked and began sending pornographic spam while making ice       cubes. Baby monitors have been used to eavesdrop on and even speak to sleeping       (or likely not sleeping) children. In October 2016, thousands of security       cameras were hacked to create the largest-ever Distributed Denial of Service       (DDoS) attack against Dyn, a provider of critical Domain Name System (DNS)       services to companies like Twitter, Netflix, and CNN. And in March 2017,       Wikileaks disclosed that the CIA has tools for hacking IoT devices, such as       Samsung SmartTVs, to remotely record conversations in hotel or conference       rooms. How long before those are commandeered for nefarious purposes?               Privacy is also a concern with IoT devices. How much do you want KitchenAid to       know about your grocery-shopping habits? What if KitchenAid partners with       Amazon and starts advertising to you about which blueberries are on sale this       week? What if it automatically orders them for you?               At present, IoT attacks have been relatively scarce in frequency, likely owing       to the fact that there isn't yet huge market penetration for these devices. If       just as many homes had Cortanas as have PCs, we'd be seeing plenty more       action. With the rapid rise of IoT device popularity, it's only a matter of       time before cybercriminals focus their energy on taking advantage of the       myriad of security and privacy loopholes.       Security and privacy issues on the horizon               According to Forrester's 2018 predictions, IoT security gaps will only grow       wider. Researchers believe IoT will likely integrate with the public cloud,       introducing even more potential for attack through the accessing of,       processing, stealing, and leaking of personal, networked data. In addition,       more money-making IoT attacks are being explored, such as cryptocurrency       mining or ransomware attacks on point-of-sale machines, medical equipment, or       vehicles. Imagine being held up for ransom when trying to drive home from       work. "If you want us to start your car, you'll have to pay us $300."               It'll be like a real-life Monopoly game.               Privacy and data-sharing may become even more difficult to manage. For       example, how do you best protect children's data, which is highly regulated       and protected according to the Children's Online Privacy Protection Rule       (COPPA), if you're a maker of smart toys? There are rules about which       personally identifiable information can and cannot be captured and transmitted       for a reason-because that information can ultimately be intercepted.               Privacy concerns may also broaden to include how to protect personal data from       intelligence gathering by domestic and foreign state actors. According to the       Director of National Intelligence, Daniel Coats, in his May 2017 testimony at       a Senate Select Committee on Intelligence hearing: "In the future, state and       non-state actors will likely use IoT devices to support intelligence       operations or domestic security or to access or attack targeted computer       networks."               In a nutshell, this could all go far south-fast.       So why are IoT defenses so weak?               Seeing as IoT technology is a runaway train, never going back, it's important       to take a look at what makes these devices so vulnerable. From a technical,       infrastructure standpoint:                There's poor or non-existent security built into the device itself. Unlike       mobile phones, tablets, and desktop computers, little-to-no protections have       been created for these operating systems. Why? Building security into a device       can be costly, slow down development, and sometimes stand in the way of a       device functioning at its ideal speed and capacity.        The device is directly exposed to the web because of poor network       segmentation. It can act as a pivot to the internal network, opening up a       backdoor to let criminals in.        There's unneeded functionality left in based on generic, often       Linux-derivative hardware and software development processes. Translation:       Sometimes developers leave behind code or features developed in beta that are       no longer relevant. Tsk, tsk. Even my kid picks up his mess when he's done       playing. (No he doesn't. But HE SHOULD.)        Default credentials are often hard coded. That means you can plug in your       device and go, without ever creating a unique username and password. Guess how       often cyber scumbags type "1-2-3-4-5" and get the password right? (Even Dark       Helmet knew not to put this kind of password on his luggage, nevermind his       digital assistant.)               From a philosophical point of view, security has simply not been made an       imperative in the development of these devices. The swift march of progress       moves us along, and developers are now caught up in the tide. In order to       reverse course, they'll need to walk against the current and begin       implementing security features-not just quickly but thoroughly-in order to       fight off the incoming wave of attacks.       What are some solutions?               Everyone agrees this tech is happening. Many feel that's a good thing. But no       one seems to know enough or want enough to slow down and implement proper       security measures. Seems like we should be getting somewhere with IoT       security. Somehow we're neither here nor there. (Okay, enough quoting Soul       Asylum.)               Here's what we think needs to be done to tighten up IoT security.       Government intervention               In order for developers to take security more seriously, action from the       government might be required. Government officials can:                Work with the cybersecurity and intelligence communities to gather a       series of protocols that would make IoT devices safer for consumers and       businesses.        Develop a committee to review intelligence gathered and select and       prioritize protocols in order to craft regulations.        Get it passed into law. (Easy peasy lemon squeezy)               Developer action               Developers need to bake security into the product, rather than tacking it on       as an afterthought. They should:                Have a red team audit the devices prior to commercial release.        Force a credential change at the point of setup. (i.e., Devices will not       work unless the default credentials are modified.)        Require https if there's web access.        Remove unneeded functionality.               Thankfully, steps are already being taken, albeit slowly, in the right       direction. In August 2017, Congress introduced the Internet of Things       Cybersecurity Improvement Act, which seeks to require that any devices sold to       the US government be patchable, not have any known security vulnerabilities,       and allow users to change their default passwords. Note: sold to the US       government. They're not quite as concerned about the privacy and security of       us civies.               And perhaps in response to blowback from social and traditional media,       including one of our one posts on smart locks, Amazon is now previewing an IoT       security service.               So will cybersecurity makers pick up the slack? Vendors such as Verizon,       DigiCert, and Karamba Security have started working on solutions purpose-built       for securing IoT devices and networks. But there's a long way to go before       standards are established. In all likelihood, a watershed breach incident (or       several), will lead to more immediate action.       How to protect your IoT devices                What can regular consumers and businesses do to protect themselves in the       meantime? Here's a start:                Evaluate if the devices you are bringing into your network really need to       be smart. (Do you need a web-enabled toaster?) It's better to treat IoT tech       as hostile by default instead of inherently trusting it with all your personal       info-or allowing it access onto your network. Speaking of.        Segment your network. If you do want IoT devices in your home or business,       separate them from networks that contain sensitive information.        Change the default credentials. For the love of God, please come up with a       difficult password to crack. And then store it in a password manager and       forget about it.               The reason why IoT devices haven't already short-circuited the world is       because a lot of devices are built on different platforms, different operating       systems, and use different programming languages (most of them proprietary).       So developing malware attacks for every one of those devices is unrealistic.       If businesses want to make IoT a profitable model, security WILL increase out       of necessity. It's just a matter of when. Until then.gird your loins.                       Regards,               Roger              --- DB 3.99 + PQUSA        * Origin: NCS BBS - Houma, LoUiSiAna (1:3828/7)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca