Data Breaches Through Wearables Put Target Squarely on IoT in 2017
Security needs to be baked into IoT devices for there to be any chance of halting a DDoS attack, according to security experts.
Forrester predicts that more than 500,000 internet of things (IoT) devices will suffer a compromise in 2017, dwarfing Heartbleed. Drop the mic — enough said. With the sheer velocity of how the distributed denial-of-service (DDoS) attacks spread through common household items such as DVR players, makes this sector scary from a security standpoint... The analyst firm adds that when smart thermostats alone exceed over 1 million devices, it’s not hard to imagine a vulnerability that easily exceeds the scale of Heartbleed. Security as an afterthought for IoT devices is not an option, especially when you can’t patch IoT firmware because the vendor didn’t plan for over-the-air patching.
Alex Vaystikh, co-founder/CTO of advanced threat detection software provider SecBI, says small-to-midsize businesses and enterprises alike will suffer breaches originating from an insecure IoT device connected to the network. The access point will be a security camera, climate control, an old network printer, or even a remote-controlled lightbulb. This was demonstrated in September in a major DDoS attack on the web site of security expert Brian Krebs. A hacker found a vulnerability in a brand of IoT camera and caused millions of them to simultaneously make HTTP requests from Krebs’ site.
Florin Lazurca, senior technical manager at Citrix, believes that consumers will be a target of opportunity in 2017. Innovative criminal enterprises will devise ways to monetize on potentially billions of internet-facing devices that many times do not meet stringent security controls. “Want to browse the internet? Pay the ransom. Want to use your baby monitor? Pay the ransom. Want to watch your smart TV? Pay the ransom,” Lazurca says...
- Tags:
- Alex Vaystikh
- American National Standards Institute
- artificial intelligence (AI)
- AT&T
- big data
- Blue Medora
- botnet zombies
- Brian Krebs
- Citrix
- Corey Nachreiner
- CounterTack
- cybersecurity
- data breaches
- data privacy
- data security
- distributed denial-of-service (DDoS) attacks
- E8 Security
- Florin Lazurca
- Forrester
- Google’s TensorFlow
- Gunter Ollmann
- Heartbleed
- Hitachi Group Company
- Internet of Things (IoT)
- IoT botnets
- IoT devices
- IoT security threats
- Jeannie Warner
- Leena Joshi
- Linux
- Lucas Moody
- machine learning
- Mark Bregman
- Matt Rodgers
- Mike Davis
- Mike Kelly
- Mirai botnet
- National Institutes of Standards and Technology’s (NIST)
- NetApp
- NIST National Cyber Center of Excellence
- NIST SP 800
- open source
- open source machine learning libraries
- open source software (OSS)
- OSIsoft
- Palo Alto Networks
- Pentaho
- Quentin Gallivan
- Ryan Francis
- SecBI
- Stan Black
- Steven Sarnecki
- threat detection software
- Vectra Networks
- WatchGuard Technologies
- Wearables
- web- or mobile-enabled control applications
- Whitehat Security
- Login to post comments