A few months ago, leaked documents revealed collaboration between the CIA and spy agencies in the UK to use smartphones and Samsung smart TVs for surveillance. From that moment, users became aware that each household is exposed and their private conversations or life moments could be recorded and stored for further use. Moreover, the CIA has been accused of implementing a hacking tool that enables its agents to bypass encryption and access smart devices.
In the wake of recent terrorist attacks, regulators in the UK are speaking against online privacy and demand tech giants provide them with tools to monitor online activity, conversations and users’ private data. While governments argue with tech companies, human rights organizations and watchdogs, users are kept in the dark and still vulnerable to online spying.
Because so many weak IoT devices are out there, one mistake can compromise an entire infrastructure and lead to massive attacks. Hackers are rarely interested in what actually goes on in your home, unless you are dealing with a predator. Hackers care more about vulnerabilities in your devices that they can exploit for other purposes.
“It’s not just that they [cyber-criminals] are going to get into your fridge and find out how many yoghurts you eat a week. The fact is that your ‘internet of things’ are all plugged into the same network and that provides the criminal with a back door into your network,” warns Mike Barton, national lead on crime operations and Chief Constable of Durham Police in the UK.
“The more you connect up your devices, the more you give people the opportunity to invade and the more there is a very real challenge to your security.”
Barton emphasized connected devices should carry a product and service quality certification according to their security level. Because it’s a collective responsibility and the industry is starting to make some efforts to safeguard smart devices and online activity, users shouldn’t forget that it’s also their responsibility to stay awake from suspicious networks or email attachments, avoid reusing the same weak passwords and replace factory credentials, never install applications that look suspicious or are not from official stores.
tags
After having addressed topics such as NFC, startups, and tech innovation, she has now shifted focus to internet security, with a keen interest in smart homes and IoT threats.
View all postsNovember 14, 2024
September 06, 2024