Router vulnerabilities are frequent, and smart home security is worrying

According to Bloomberg, the dangers of the Internet of Things are greater than most people realize, and hackers can easily invade Wi-Fi routers in almost all homes, which is a big problem for users who have previously associated bulbs and faucets. .

Recently, a Washington-based cybersecurity expert, Gene Bransfield, developed a small device called WarKitteh. WarKitteh is a cat collar with Spark Core decryption chip, Wi-Fi wireless network card and GPS module. Bransfield put the collar on a Siamese cat named Coco, then let the cat roam around the neighbor's house and recorded the Wi-Fi network available around. As a result, the cat collar found 23 (more than 1/3 of the total) network passwords and still used outdated WEP (Wired Encryption Technology) to encrypt passwords instead of the most advanced WPA.

Bransfield plans to showcase his cat collar at the Black Hat Security Conference in Las Vegas. Dan Geer, a keynote speaker at the US Central Intelligence Agency's (CIA) venture capital division, once said that home routers have the opportunity to be created as a hacker-controlled botnet and cause a network crash. In fact, due to the experiment, the router botnet has been successfully created.

The recent DEFCON 22 hacking conference in Las Vegas, USA, featured the challenge of invading routers called "SOHOpelessly Broken", which stands for small offices and home offices. It is understood that the successful display of a previously unknown vulnerability in the common router, you can get a bonus of 500 US dollars and next year's DEFCON accommodation reward. In the security conferences of recent years, how to break the protection of routers has become commonplace. In 2011, a group of hackers in Brazil broke through 4.5 million Wi-Fi routers, stole personal information from all users, and obtained some ill-gotten gains.

Bruce Schneier, a network security expert, points out that these routers typically use inexpensive components and simple programming that can be sold as long as they are up and running. The manufacturer has no incentive to update the firmware to be older than the hardware it runs on. Since the manufacturer did not follow up on these devices, the only way to install patches when the routers are sold can only be installed by the user.

But the loopholes that exist today in routers used in homes and small offices are no longer a big issue. It is useless to steal an ordinary home network unless a badly remembered user keeps some credit card numbers and unencrypted passwords in the file. Botnets that crash the network and cause network crashes are currently only found in science fiction novels about cyber warfare between countries.

However, when homes are filled with associated equipment such as thermostats, smoke detectors, faucets, lockers, and light bulbs, the lack of defense capabilities of the router can be a big problem. Hackers can easily invade the center of the home network and do whatever they want on smart home devices: turn on and unlock—turn on the faucet switch to flood the house—and send alerts to users who are attending important meetings.

Schneier believes that vulnerabilities must be addressed, which requires pressure on embedded system vendors to design better systems. He called for router firmware and third-party security software to have automatic updates. However, it takes time to put it all into practice, and it also needs to teach a large number of end users how to operate. Currently, most users choose to use only the cheapest Wi-Fi hubs, or use routers provided by their cable operators, who are clearly not interested in protecting device security.

Therefore, users only have the opportunity to do maintenance and security work until the router manufacturer is convinced to pay attention to security issues. This means that the associated device of the smart home can be prevented from being maliciously operated. If the cost of using a smart home is to risk the house being flooded after being hacked, then the user might as well choose to open the tap by hand to be safer.

Wall Split Type Air Conditioner series including all types of wall split type a/cs suitable for different markets, can offer the a/cs with R410A, R32 or R22 refrigerant, including DC inverter and normal on-off wall split type a/cs, also include the a/cs with power supply of 220~240v/50Hz/1ph, 230v/60Hz/1ph, 115v/60Hz/1ph.

Wall Split Type Air Conditioner

Multi-Type Air Conditioner,Tropical Air Conditionerwo,Tropical Split Air Conditioner,Wall Split Type Air Conditioner

Foshan Dinghan Electrical Technology Co., Ltd , https://www.dinghanelectrical.com

This entry was posted in on