среда, 28 сентября 2011 г.

Intelligent Devices, Security fools?

At this point, you can buy a car that can be unlocked by simply touching the door handle. No need to struggle with buttons or keys.

Known by various names, including "Keyless Go" and "Smart Key", this feature is available for a fresco or less as an option on several cars, including Mercedes-Benz S-Class E-Class and SL-Class, the Cadillac STS, and the Nissan Infiniti M.

On the domestic front, which today can become smart home appliances that connect to the smart meter – if you already have one – to turn themselves and only during hours when electricity costs less.

And intelligent devices connected to the Internet via landlines or wireless, for ease of use are available for both home and office. You can use the Internet, for example, turn on the digital video recorder remotely and record a favorite show or print a document while you're stuck in traffic on the way to the office.

Google (Nasdaq: GOOG announced in May and Tungsten @ home project Android.

The first allows you to discover Android applications, connect and communicate with the appliances of users. The latter will give consumers more control over music playback within their networks Android @ home. All this will take place over the Internet.

<! –/ps: 55 crid: 7455: cloudsum_sepnov_160-1 cc: de ->

After Smarts can hurt

The disadvantage of smart devices is that they are as intelligent as a dog dumber than usual – can not discriminate between good and evil commands and do what any man says that regardless of whether or not man is his master.

That makes them a security threat.

"In many cases, threats may be even more serious vulnerabilities in traditional computers, because people do not understand what data is stored in them and are at risk," Kevin Brown, director of testing at ICSA Labs , said TechNewsWorld.

The situation is not helped by the device manufacturers, who apparently prefer the ease of use above all else.

"When it comes to ease of use versus security, ease of use tends to win, and vendors to enable the default functionality to make sure you are aware of it," said Michael Sutton, vice president of security research ThreatLabZ Zscaler said TechNewsWorld.

That's because the device manufacturers want to sell their products.

"Most of the devices of the target consumers, and manufacturers are rushing to compete with consumer-oriented features such as integration into social networking services, instead of security features," Tom Kemp, CEO com "target =" _blank "> Centrify, told TechNewsWorld.

Roll Over, Rover

Expensive cars could be a target because of its value. The researchers demonstrated at the Black Hat security conference last summer that you can unlock and start another late model cars with the simple text message.

The technology to do this is not new.

TEXT2C offers technology that allows users to open their doors automatic with a text message and, of course, someone offers you a v = YztB-NEX52INR = 1 "target =" _blank "> iPhone app for it.

It's just that no one has shown that criminals can steal someone's car only with a smartphone.

However, the great reward for cybercriminals could come from intelligent devices installed at the office.

"Most of the devices that we find exposed to pose a security risk are copiers, scanners, telephone systems and webcams, all of which could be used both in a business environment or consumption, especially for employees work from home, "said Sutton Zscaler.

"We found photocopies of the documents could be retrieved via the Internet, scanners that can be operated remotely and telephone systems that allows listeners," said Sutton.

Piracy on a smart device for office on the Web is "very easy", said Brown. Only use Google inurl search function to the string of the URL of the Web-enabled printer commonly used to find one that is accessible from the Internet, and then see if you can boot.

Where the dangers lie

Some of the devices located through a search inurl allow anyone to connect directly to a printer or multifunction device over the Internet without the need for access, Brown said ICSA.

That could allow a hostile visitor to reconfigure the printer is inaccessible, or reading pre-printed documents, for example, Brown said.

Web-enabled devices usually come with embedded Web servers that are enabled. However, often, or have no password or use a default password that can be found in the user manuals downloaded from the Internet, Zscaler Sutton said.

Also, remotely take over search and smart devices is apparently not too difficult.

"Any connected device that can be flashed or altered can be hacked remotely," said Rob Enderle, principal analyst at Enderle Group, TechNewsWorld.

Office devices more intelligent and smart meters are connected to the network, so that piracy in half you have accessed the back end of the network and access everything on that network, Brown said ICSA.

In addition, smart devices and smart meters offices are easy to hack, because they tend to run the same operating system and firmware, and memory is limited. Therefore, there is little or no security protection software, Brown said.

However, the washer and dryer are probably safe, except maybe pranksters.

"Yes, some devices are vulnerable, but the washing machines are not," said Dmitry Molchanov, senior research analyst at Yankee Group, TechNewsWorld. "They just do not convey information that is sensitive enough to merit a security risk. "

Possible solutions for elegance

Both suppliers and users should ensure that smart devices are safe as far as possible.

Providers should send intelligent devices with a single password or each with its embedded Web server functionality disabled until the user enters a single password, Sutton Zscaler recommended.

That could provide a basic level of security, but "the attackers tend to be a step forward," said Kemp's Centrify. Hackers likely to turn to social engineering and phishing, and the parrot "I'm not sure if the protection can be integrated into the device. "

Users should think about what you're getting.

"Before installing a new device connected, consider what would happen if a hostile force obtains control over it," Enderle suggested.

"Anyone remotely changing channels would be annoying, but an oven to" clean "for 48 hours, could take from home," said Enderle.

Читать полностью или написать коммент.. Про установку спутниковых тарелок в Московской областиhttp://tarelka-tv.ru/

Комментариев нет:

Отправить комментарий