Академический Документы
Профессиональный Документы
Культура Документы
12:32 12:32
21C
21C
Danger ranking
To help you understand the potential dangers that come with smart products
weve given each item a danger rating out of 10 based on the physical,
financial or emotional consequences of being hacked or spied on.
See some examples of our ratings below...
Contents
4...........Introduction
6...........Smart Alarm
22.........Speakers
23.........Streaming Box
8...........Computer
24..........Tablets
25.........Smart Television
26.........Smart Thermostat
27.........Smart Toilet
12..........Ebook Reader
28.........Smart Toys
13..........Energy Meter
15..........Games Consoles
31..........Smart Watch
32.........Webcam
17..........Smart Oven
33.........Top Tips
18..........Smart Radio
34.........Top 50 Devices
19..........Smart Refrigerator
36.........Glossary Of Terms
20.........Smartphone
12:32
SMART ALARM
A smart burglar alarm is a sophisticated home-wide alarm system
that communicates with your smartphone via an app.
Vulnerabilities
Hackers able to compromise home security systems could deactivate the
system entirely. If the home security system is linked to door locks hackers could
not just deactivate the surveillance and alarms, but open doors to homes.
Vulnerabilities
Hackers can hack into smart baby monitors and frighten infants by playing malicious
messages through the products speakers. For smart baby monitors with video
functionality hackers could play inappropriate content on the screen. Smart baby
monitor cameras can be hacked into and used for spying on a family.
COMPUTER
Computers and especially laptops are part of daily life. If anyone uses
a computer or laptop chances are it is connected to the internet either
via cable or wireless.
INTERNET-CONNECTED CAR
A connected car is equipped with internet access, allowing the vehicle
to communicate with other devices inside and outside the vehicle.
Internet connected cars can provide many benefits to the driver including
automatic notification of crashes, notification of speeding and safety alerts.
Vulnerabilities
Private or corporate information could be obtained by hackers, the hard drive could
be corrupted through viruses and malware, passwords could be obtained through
brute force attacks, man-in-the-middle attacks could be employed to obtain
passwords over the wireless and the webcam could be activated and used for spying.
Vulnerabilities
A recent experiment* proved that critical driving aids, such as the brakes, steering
and acceleration could be manipulated and deactivated wirelessly by hackers.
Hackers can also change the temperature and power of vents, switch radio stations,
activate windscreen wipers and wiper fluid and compromise in-car digital
displays and readouts.
*www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/
Vulnerabilities
Photographs taken on an internet-connected digital camera could be intercepted by
hackers and stolen. If you have any private family photographs or intimate images
these could be used against you by the hackers. Alternatively, cybercriminals could
upload malicious and inappropriate images onto the camera.
Vulnerabilities
Hackers can intercept smart lock knock knock passwords from door lock apps
(broadcast via Bluetooth / Wi-Fi) and use this to gain entry to a home. If an owners
phone is stolen then the thief has full access to the app and the door locking system,
potentially allowing them to steal far more than a phone.
10
11
8.92
EBOOK READER
While they might not have brought down the paperback book,
EBook readers are nevertheless very popular devices allowing people
to download and read books on the go as and when they like.
ENERGY METER
Smart meters are the next generation of gas and electricity meters
for premises. They offer a range of functions for telling you how much
energy is being used through a display in the premises.
Vulnerabilities
Hackers could obtain personal information and credit card details
through man-in-the-middle attacks.
Vulnerabilities
Personal activity information could potentially be obtained by hackers. After a
number of days analysing this data trends will begin to appear showing when the
premise is unoccupied. Energy data can enable companies to profile homeowners
and delve into their personal lives for marketing purposes.
12
13
PM
67B
GAMES CONSOLES
Consoles are no longer just for playing games. Nowadays they
are continually connected entertainment hubs, enabling streaming and
downloading of videos and music, internet browsing and communications.
Vulnerabilities
The current generation of internet-connected consoles are often linked to owners
personal information and credit card details. This sensitive information could be
obtained through hacks, as was the case in 2011*, when thousands of users of a
consoles network saw their data swiped by hackers.
*www.bbc.co.uk/news/technology-13192359
and uk.playstation.com/psn/news/articles/detail/item369506/PSN-Qriocity-Service-Update/
14
15
SMART OVEN
A smart oven can save energy, allow you to control the temperature from
your smartphone and tablet, and might even come with an internal oven cam
so you can keep a close eye on your food as it cooks.
Vulnerabilities
Personal activity information could potentially be obtained, after a number of days
watching, trends will appear showing when the premise is unoccupied. A recent
experiment* has revealed how easy it is for hackers to hack into network-enabled
LED light bulbs, enabling them to obtain wireless passwords.
Vulnerabilities
If your smart oven falls victim to a hacker its temperature can be arbitrarily set at
any time even when the owner is not at home. Not only could this ruin whatever
you might have cooking, it could also cause a fire that could seriously damage a
home and put personal safety in danger.
*www.bbc.co.uk/news/technology-28208905
16
17
SMART RADIO
Smart radios allow the user to listen to thousands of radio stations around
the world, no matter where they are located through streaming content
via the internet.
SMART REFRIGERATOR
Smart fridges can automatically place orders for food items
youre running low on and save energy.
Vulnerabilities
In addition to annoying homeowners by randomly switching radio stations or
manipulating the volume of the radio, malicious people could hack the device
and broadcast inappropriate content through the speakers.
Vulnerabilities
Not only can cybercriminals cause chaos by placing multiple orders of foods you
dont need, they can also deactivate the product, increase the temperature inside
the fridge, steal your email login details, send out spam emails or even swipe your
personal details and credit card information.
18
19
SMARTPHONE
Today, millions of smartphone users will check their device hundreds of times
a day to browse the internet, make calls, send messages and
consume content on social media.
Vulnerabilities
Smartphones are effectively pocket-sized computers and consequently a conduit
for hackers and dubious organisations to find out a great deal about users.
Malicious persons can obtain personal information through rogue apps, trick the user
into installing malicious apps, hack into cameras, access content on the device and
download inappropriate images onto the device. Smartphones are also vulnerable
to hackers if they are connected to insecure public Wi-Fi networks, such as those
in cafes and restaurants.
Vulnerabilities
Smoke alarms could be potentially turned off by a hacker without the user
being aware. The consequences of this are clear andlife threatening.
20
21
SPEAKERS
Wireless speakers are used to stream music around a room or to earphones.
Thanks to these devices households can play the same music to multiple
rooms in their home, all without wires, and manually control the speaker
system from their tablets or smartphones.
STREAMING BOX
Dedicated streaming devices allow you to stream thousands of
TV shows and films to your TV at the press of a button.
Vulnerabilities
As with smart radio devices, malicious hackers could activate the speaker system
and stream intimidating, scary sounds and messages through the speakers
at any time of the day or night.
22
Vulnerabilities
Hackers could retrieve your personal information including credit card details by
compromising the streaming devices. In addition, they could intercept your traffic
and stream malicious content to your TV.
23
TABLETS
Touchscreen tablets are part and parcel of daily home life, used to aid
everyday tasks, allowing families to work, play, read, view and listen
to content wherever they are.
SMART TELEVISION
Smart TVs offer cutting-edge, high-definition visual quality while also
letting you enjoy apps, surf the web and stream internet videos from
the comfort of your sofa.
Vulnerabilities
Cyber criminals can obtain personal information and credit card details by
hacking tablets. Hackers can trick the user into installing malicious applications and
conduct man-in-the-middle attacks. Tablets are also vulnerable to hackers if they are
connected to insecure public Wi-Fi networks, such as those in cafes and restaurants.
Vulnerabilities
There have already been high-profile scandals involving smart televisions.
Recently one brand of TVs was shown to be capable of listening to peoples voices
and sending that data back to the manufacturer. Another TV brand was criticised
when a parent discovered it could track and record his childrens viewing habits.
24
25
21C
SMART THERMOSTAT
Smart thermostats can be used to configure the heating of premises through
the use of mobile apps. This affords homeowners greater control over
a homes central heating and energy consumption.
SMART TOILET
High-tech toilets have been all the rage in countries like Japan for decades
and as their technology has evolved demand for smart toilets has expanded,
as have their vulnerabilities to hackers.
Vulnerabilities
Hackers could alter the temperature at a whim or deactivate the central heating
system entirely. Hackers that drastically decrease the temperature or deactivate the
smart thermostat system entirely could create an environment thats very dangerous
for certain people, such as the elderly, who may be susceptible to illnesses arising
from cold temperatures.
Vulnerabilities
Hackers could control the toilets remotely including the lid, flush, bidet and
hot-air blower. Not only could this infuriate or injure owners, it can increase energy
costs through higher water use. In a nightmare scenario hackers could hold
homeowners to ransom by threatening to overflow the toilet every day until the
homeowner pays them a fee.
26
27
SMART TOYS
Whether its Wi-Fi dolls or smart educational products, as childrens toys
have become more advanced so too have the potential opportunities
for these toys to become conduits for hackers to cause havoc or for
companies to spy on families.
Vulnerabilities
Recently, a childrens doll was famously hacked to say rude words*, while another
well-known brand of doll was red flagged by privacy activists** for recording
childrens voices and sending the audio to the manufacturer via the internet.
Vulnerabilities
While the consequences of a hacker compromising a robot vacuum may not be
as severe as some other household appliances, it can still cause annoyance
to homeowners. Hackers could, for example, override the vacuums sensors
so that they start knocking over objects within the premises.
*www.bbc.co.uk/news/technology-28208905 ** www.washingtonpost.com/news/the-switch/wp/2015/03/11/
privacy-advocates-try-to-keep-creepy-eavesdropping-hello-barbie-from-hitting-shelves/
28
29
12:32
SMART WATCH
Smart watches are all the rage at the moment, with all of the leading tech
brands competing to release the most sophisticated, most stylish smart
timepieces around. However, these smart watches could be a ticking
hacking time bomb.
Vulnerabilities
A compromised smart washing machine could be turned on or off and the heat
adjusted by a hacker. This could damage clothes, increase electricity costs and even
cause flooding. Additionally, a hacker could force a washer to run beyond its
maximum speed and temperature. The appliance would soon set on fire, or even
explode, if continually subjected to these forces.
Vulnerabilities
The security concerns around a smart watch are similar to that of a smartphone
or tablet. Indeed, if a hacker was to compromise a smart watch they could raid the
owners personal information, including contacts, pictures, identity and credit card
information, using this to commit fraud.
30
31
WEBCAM
Webcams are nothing new. However, as the internet has evolved and
allowed for lag-free video calling, the webcam has become a digital
essential for households.
Vulnerabilities
In 2014 a website posted dozens of live feeds from regular peoples hacked
webcams, causing global privacy concerns*. The ease of the hacks means that
tech-savvy criminals could also intercept web cams to watch when people are
and are not at home and plan a burglary.
*www.bbc.co.uk/news/technology-30121159
32
33
Top 50 devices
Glossary of Terms
No
Device
Rating
No
Device
Rating
10
26
Smart fridge
Computer / laptop
27
28
Wireless speakers
Smartphone
29
Tablet
30
Air purifier
31
32
Smart luggage
Internet-connected car
33
Router
34
Smart radio
10
35
Smart television
11
36
12
37
13
Smart toys
38
14
Smart watch
39
Smart dishwasher
15
TV streaming / Satellite TV
40
16
Webcam
41
Sprinkler system
17
Drone
42
18
EBook reader
43
19
44
20
45
21
46
Smart scales
22
Smart meter
47
Smart toilet
23
Smart thermostat
48
Wireless headphones
24
49
Smart cutlery
25
Key finder
50
Smart pen
34
35
www.hidemyass.com