https://www.iotworldtoday.com/wp-content/themes/ioti_child/assets/images/logo/mobile-logo.png
  • Home
  • News
    • Back
    • Roundups
  • Strategy
  • Special Reports
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Podcasts
    • Strategic Partners
    • Latest videos
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Editorial Submissions
  • Events
    • Back
    • Embedded IoT World (Part of DesignCon) 2022
Iot World Today
  • NEWSLETTER
  • Home
  • News
    • Back
    • Roundups
  • Strategy
  • Special Reports
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Podcasts
    • Strategic Partners
    • Latest videos
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Editorial Submissions
  • Events
    • Back
    • Embedded IoT World (Part of DesignCon) 2022
  • newsletter
  • IIoT
  • Cities
  • Energy
  • Homes/Buildings
  • Transportation/Logistics
  • Connected Health Care
  • Retail
  • AI
  • Metaverse
  • Development
  • Security
ioti.com

Security


Thinkstock

A silhouette of a hacker with a black hat in a suit enters a hallway with walls textured with blue internet of things icons 3D illustration cybersecurity concept

5 Connected Car and Smart Home Security Risks

The themes of automotive and smart home security are getting more attention as cybersecurity researchers and cybercriminals set their sights on those targets.
  • Written by Brian Buntz
  • 4th March 2019

For years, cybersecurity experts have been warning about the potential of connected toasters, washing machines and all manner of connected home appliances to be targeted. Now, a growing number of vendors and security are demonstrating smart home security risk, and, in some cases, cybercriminals are attacking IoT devices to launch new types of attacks.

1. Hacked Nest Security Camera Warns of Nonexistent Missile Strike

A family in the San Francisco Bay Area was alerted to an alarm signal stating North Korean ballistic missiles were en route to sites in Los Angeles, Chicago and Ohio via a speaker in a Nest camera, according to The Mercury News. Convinced the message was real, occupants of the house scrambled to evacuate their home. But after calling 911 and Nest, the family learned the message was from a hacker rather than a government warning system. A statement from Google indicated that victims in similar attacks had their passwords breached and that two-factor authentication could greatly reduce the risk of such smart home security breaches.

2. Hacking-Based Car Theft and Other Hijinks

Late last year, researchers from KU Leuven University in Belgium demonstrated vulnerabilities in high-end vehicles equipped with a passive keyless entry and start system. In a video demo, they demonstrate how they could break the encryption in Tesla’s Model S key fobs in less than two seconds. In recent years, other researchers demonstrated the feasibility of other connected-car–based attacks against vehicles such as the Mitsubishi Outlander plug-in hybrid electric SUV and, most famously, a Jeep Cherokee. While researchers have stirred up considerable attention around the topic of automotive cybersecurity, a handful of thieves have made off with cars by intercepting the signal from key fobs.

3. Big Trouble With Little Voice Commands

Avast demonstrated at its MWC booth the risk of a breached Sonos speaker with an Amazon Alexa speaker nearby. When the Sonos system was fed a command such as: “Hey Alexa, add Tesla Model 3 to my shopping list,” the smart speaker gleefully complied. While the demo makes a point that the smart home opens up possibilities to manipulate smart speakers, thieves are more likely to procure a new Tesla by intercepting the signal from a key fob than attempt to order a vehicle on a stranger’s smart speaker.

4. Storming Smart Home Hubs

In the past couple of years, the concept of a smart home hub has gained in popularity following the introduction of devices such as the Echo Show, the Google Home Hub and the ease with which a tablet computer could be fashioned into a control center for the smart home. Last year at MWC, Kaspersky Lab researchers demonstrated the vulnerability of such a smart home hub, which can then be used to control theoretically any smart home gadget in the house. Kaspersky didn’t disclose the vendor’s name, but explained that if an attacker knows the serial number of the hub, or if the number is brute forced, he or she can easily extract login information and break the weak encryption protecting the password.

5. Smartphone Hacks That Could Lead to Home Burglary

In the most recent quarterly McAfee Mobile Threat Report, the cybersecurity company warns about the proliferation of Android-based malware such as TimpDoor, which was first discovered roughly a year ago. Because smartphones control smart home gadgets, the company writes that “it was only a matter of time before criminals looked for ways to trick users into letting them inside [their homes].” Victims of the TimpDoor attack may click on a link from a hacker’s SMS message, thus sidestepping the Google Play store.  

Tags: Supply Chain, Transportation & Logistics Security Features

Related


  • Image shows welding robotics and a digital manufacturing operation.
    IoT Supply Chain Vulnerability Poses Threat to IIoT Security
    The supply chain provides building blocks for IoT but also vulnerabilities. IT pros need to ward against malicious attacks that exploit supply chain security gaps.
  • IoT Security Needs Pen Testing Approach
    IoT pen testing is a no-brainer, say experts. But don’t test everything.
  • Image shows a digital background depicting innovative technologies in security systems,
    Securing IoT Devices With Zero Trust Requires Mindset Shift
    Zero-trust approaches require a shift in mindset to ensure IoT devices have rigorous security policies applied — and the work is never done, say IT pros.
  • An Integrated Approach to IoT Security
    This e-book provides a comprehensive framework to help organizations reduce risk in IoT products and environments.

One comment

  1. Avatar Ben Hobbs 26th March 2019 @ 12:57 am
    Reply

    The more sophisticated that Smart Home Technology gets then the higher the risks. Also the shear amount of high technology products that we have in our home is multiplying exponentially -going forward Cyber Security and Privacy is going to become an important aspect of the industry – where do you draw the line between usefulness and overstepping the boundary.

Leave a Reply to Ben Hobbs Cancel reply

-or-

Log in with your IoT World Today account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Related Content

  • Common Internet of Things Security Pitfalls 
  • Can Privacy-Preserving Machine Learning Overcome Data-Sharing Worries?
  • Developing a Critical Infrastructure Cybersecurity Strategy
  • Addressing IoT Security Challenges From the Cloud to the Edge 

Roundups

View all

IoT Deals, Partnerships Roundup: Google, Arm, Senet and More

26th May 2022

IoT Product Roundup: PTC, Nokia, Arm and More

19th May 2022

IoT Deals, Partnerships Roundup: Intel, Nauto, Helium and more

14th May 2022

White Papers

View all

The Role of Manufacturing Technology in Continuous Improvement Ebook

6th April 2022

IIoT Platform Trends for Manufacturing in 2022

6th April 2022

Latest Videos

View all
Dylan Kennedy of EMQ

Embedded IoT World 2022: Dylan Kennedy of EMQ

Dylan Kennedy, EMQ’s VP of global operations, sat down with Chuck Martin at Embedded IoT World 2022.

Embedded IoT World 2022: Omdia’s Sang Oh Talks Vehicle Chip Shortage

Omdia’s automotive semiconductor analyst sits down with Chuck Martin at this year’s event

E-books

View all

How Remote Access Helps Enterprises Improve IT Service and Employee Satisfaction

12th January 2022

An Integrated Approach to IoT Security

6th November 2020

Webinars

View all

Rethinking the Database in the IoT Era

18th May 2022

Jumpstarting Industrial IoT solutions with an edge data management platform

12th May 2022

AI led Digital Transformation of Manufacturing: Time is NOW

9th December 2021

Special Reports

View all

Omdia’s Smart Home Market Dynamics Report

7th January 2022

Cybersecurity Protection Increasingly Depends on Machine Learning

28th October 2020

IoT Security Best Practices for Industry and Enterprise

20th October 2020

Twitter

IoTWorldToday, IoTWorldSeries

This white paper by @braincubeEn explores how the changes of 2020 and 2021 are shaping the future of #IIoT. Learn w… twitter.com/i/web/status/1…

27th May 2022
IoTWorldToday, IoTWorldSeries

UK Investing $50M for Self-Driving Buses, Vans dlvr.it/SR9QlJ https://t.co/sQdX2tJY4d

27th May 2022
IoTWorldToday, IoTWorldSeries

Dubai to Use Satellite IoT Terminals for Utilities Industry dlvr.it/SR9NQB https://t.co/GXf9Gx5RCw

27th May 2022
IoTWorldToday, IoTWorldSeries

@BerkshireGrey’s AI-powered next-gen warehouse robot is helping retailers by cutting times for order fulfillment, u… twitter.com/i/web/status/1…

27th May 2022
IoTWorldToday, IoTWorldSeries

Access the insights on IoT deployments, emerging tech and new applications now. Sign up to our dedicated… twitter.com/i/web/status/1…

27th May 2022
IoTWorldToday, IoTWorldSeries

Survey finds there's a lot of on-campus affinity for @StarshipRobots delivery #robots. dlvr.it/SR79YR https://t.co/73EaFPR6ft

26th May 2022
IoTWorldToday, IoTWorldSeries

That latest #IoT deals and partnerships news from @Google, @RedHat, @Arm, @SierraWireless, @ItronInc and more!… twitter.com/i/web/status/1…

26th May 2022
IoTWorldToday, IoTWorldSeries

@Ford is testing #geofencing tech that automatically cuts vehicle speeds. iotworldtoday.com/2022/05/26/for…

26th May 2022

Newsletter

Sign up for IoT World Today newsletters: vertical industry coverage on Tuesdays and horizontal tech coverage on Thursdays.

Special Reports

Our Special Reports take an in-depth look at key topics within the IoT space. Download our latest reports.

Business Resources

Find the latest white papers and other resources from selected vendors.

Media Kit and Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • IoT World Series
  • Channel Futures
  • RISC-V
  • Dark Reading
  • ITPro Today
  • Web Hosting Talk

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Login/Register

FOLLOW IoT World Today ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2022 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X