In the News
The Internet of Things (IoT) is driving transformational change in IT infrastructures. Connecting everything — printers, medical devices, cameras, industrial devices, door locks, cars, etc. — to the network, the cloud or both is creating a vast, porous security perimeter.
From smart thermostats, which can change the temperature remotely, to intelligent lighting, controlled and adjusted from almost any smart phone or internet connected device, the addition of smart technology within a building creates an array of new access points from IoT devices. This ultimately means that when offices turn their workplaces into smart buildings, attackers have an even larger range of entry points to gain access to organizations’ networks.
You probably know by now about rampant insecurity in Internet of Things devices. You've likely even heard about vulnerabilities in desk phones specifically. Security research into the devices—and the potential for hackers to take them over, turn them into listening devices, or use them as jumping off points to take over corporate networks—has been going on for years. But even in security it seems that no good deed goes unpunished.
Security vulnerabilities in popular internet-connected digital cameras could allow hackers to infect them with ransomware, rendering the devices useless, or deploy other forms of malware which could potentially turn a camera into a gateway for infecting larger networks.
Most IoT cyberattacks result in downtime, compromised data, end-user safety, brand or reputational damage, or a loss of intellectual property, according to a new Irdeto report.
Cyberattacks on IoT devices surged 300% this year. Over 2.9 billion events were observed by one security provider’s global network of honeypots in first half of 2019. It was the first time the provider had ever measured billions of attacks occurring over a 6-month period.
Researchers Say Mirai Derivatives and EternalBlue Exploits Pummel Internet-Connected Devices
Hackers are a resourceful bunch, and they'll look for any weakness that can be exploited to break in to a computer network. Once they're in, they'll use any available method to get the data they discover out.