we dedicate October Cyber security awareness, sharing of experiences is the topic of this week. Please enjoy reading this post about security experiences that may be overlooked. Originally Posted by Juices, a recognized leader in the field of cyber security.
For every shiny new IoT device that hits the market, a hacker somewhere discovers how to hack it. Today, even routine activities can land you in plain sight.
Imagine what a bad day could look like in this age of ubiquitous connectivity… It was playing like some dystopian grindhouse movie.
What a fitting way to head to Halloween and wrap up Cyber Security Awareness Month! If you’re ready for a good online fright, let’s look at five realistic scenarios in which you’d never expect to get hacked — but just maybe.
1. Waiting for check-out
It’s a busy morning at the grocery store and six people are standing in front of you. The person in front of you shouts that they lost their credit card, then moves an apology towards the back of the line. You find it strange that it is Covid that you and other shoppers are brushing.
She holds what appears to be a portable device in her hand.
It is actually an RFID scanner.
These portable devices are widely available online for around US$1,000 and allow the holder to read data from RFID chips from a few feet away. In theory, a bad actor could enact the above scheme to steal the credit card data of the five people behind her in line.
While this threat is making a headline and has spawned an entire RFID protection industry, many experts say it’s not a reality — because the risks far outweigh the rewards. Our fictional RFID skimmer will be captured in security footage and may appear on the evening news.
Anyway, this scam will only work on first generation RFID chips, which are a few years old now.
2. In the cafe
Looking forward to a cool morning answering emails, you can have a secluded spot in your coffee shop and run that laptop. You recognize the open public WiFi, but oddly enough, it directs you to the login page for your Google account.
Weird, but whatever. It’s time to start this morning. You enter your credentials and get to work.
You just fell victim to a pineapple router.
These $99 devices plug directly into the hacker’s computer and can be configured within a few minutes to perform a number of attacks. In the sitcom Silicon Valley, we saw a pineapple posted to imitate a website. and in Mr. RobotThey used it for a man-in-the-middle attack, wiretapping the FBI.
Protecting a pineapple is really a matter of paying closer attention to the WiFi networks you’re using. Open networks that do not require passwords should be avoided whenever possible.
You should also turn off your device’s WiFi when you are not using it, and deactivate the settings to remember frequently used networks and connect automatically. This reduces the chances that the pineapple will replace the legitimate web without you even realizing it.
3. In the kitchen
Your cold morning in the café turns into a fruitful lunch, and by dinner you clearly deserve a glass of wine. Pouring a gentle red, you scan the screen over your IoT wine wrapper, and peruse the acidity of the selection and food pairings.
The wine cartridge is almost empty, but This is life. The cover will automatically request a new one. This neat feature is also available in the refrigerator water filter.
Somewhere in the darkest areas of the web, a hacker raises a glass, too. He just hacked your home network and admired your taste for wine – and your checking account balance.
While wine wrapping never hit the market, the water filter certainly did. IoT devices like this can quickly crush your sensitive data if a bad actor gets into your home network.
Keep hackers away from your smart devices by creating a secure home network. Monitor the passwords you use for both your home network and IoT devices. If you haven’t already, learn about password strength best practices.
And, obviously, make sure the passwords are different for your WiFi and all the devices connected to it. (He goes without saying… doesn’t he?)
4. Go to the bathroom
It’s been a long day. And what better way to get rid of it than to throw out all the coffee and wine that boosted your productivity? Good thing you just got an IoT toothbrush.
As you brush, a live feed is shown on your mobile device, highlighting your style and any points you may have missed.
Somewhere, in another, darker realm of the web, a hacker is also evaluating your brush game. It’s not about sensitive data this time around, just live crawling.
As you can imagine, content depicting unsuspecting victims is a huge prize – not just for people who care about this sort of thing, but also for bad actors looking to sell it.
Secure these types of devices just as you would a wine case. Shut down your home network, increase password security, and make sure bad habits don’t lay a welcome mat for hackers.
5. Even in bed
Time to call it a day and do it all over tomorrow. This kind of hustle requires a good night’s sleep, the kind of sleep a smart thermostat guarantees. It cools the room when you’re disrupting, then raises the temperature slightly once you’ve fallen asleep, preventing any awakening to shiver.
If you have any doubts that this might be a threat, try to spend the winter in Finland. By inviting the Internet of Things into your most private space, you risk being caught, by surprise, with everything from data theft, to eavesdropping, to ransomware.
Bottom line: Pay attention when and where to call
Have you ever noticed how scary B-movies tend to have morals? Perhaps we should be this: The promise of a better, more convenient life can make it easier to convince ourselves that the risks either don’t exist or have already been taken up on our behalf by someone else.
But security is an ongoing process.
The technology is released, hackers figure out a way to get around it, and then you figure out a way to stop the hackers. repeat, To infinity.
This does not mean that you should avoid the cool looking IoT devices that can make your life more wonderful. This is just a reminder to be aware of when and where to call, and then take appropriate action to ensure that you remain safe.
Meet the 27 hour day
We built The Hub by GoDaddy Pro to save you time. a lot of time. Our members report saving an average of three hours each month for each client site they maintain. Do you add that kind of time to your day?
Register for free