The Rough Notes Company Inc.
  • Home
  • About
  • Publications
  • RN Newsletter
  • Products & Solutions
  • Media Kits
  • Contact Us
  • Shop
    • Catalog
    • Enter Promo Code
    • Pay Your Existing Bill Here
No Result
View All Result
  • Home
  • About
  • Publications
  • RN Newsletter
  • Products & Solutions
  • Media Kits
  • Contact Us
  • Shop
    • Catalog
    • Enter Promo Code
    • Pay Your Existing Bill Here
No Result
View All Result
The Rough Notes Company Inc.
No Result
View All Result
Home From The Latest Issue

HACKERS ARE FINDING WAYS TO EXPLOIT THE IoT

December 7, 2016
Technology, Hackers, DDoS

Recent DDoS attacks alarm consumers to secure connected devices

On October 21, a series of Distributed Denial of Service (DDoS) attacks on domain name system provider Dyn temporarily blocked consumer traffic to nearly 70 major Internet companies, including Amazon, Netflix, Twitter, and Reddit.  A DDoS attack uses a multitude of hacked systems to attack a single target with a flood of requests; these requests are designed to overload the system and stop legitimate requests from  getting through.

Because of its deep and widespread reach, the Dyn DDoS attack grabbed headlines worldwide. But it wasn’t the first such major event. A month earlier, on September 16, Krebs on Security, a popular security news and information blog written by former Washington Post reporter Brian Krebs, was hit by a major DDoS attack. Although the attack did not succeed in knocking Krebs’ site offline, it was reportedly one of the largest DDoS assaults ever up until that time, at one point causing 665 gigabits of traffic per second.

In addition to its size, what made the Krebs incident somewhat different from prior DDoS attempts is the initial indication that the attack had been launched with the help of a botnet that had taken over millions of hacked “Internet of Things” (IoT) devices that had weak or hard-coded passwords. A description attributed to CyberTrend magazine says a botnet is a series of Internet-connected computers or other devices infected with a self-replicating back-door Trojan that lets cybercriminals force the network to perform unauthorized commands  en masse.

The use of a botnet is troubling, considering the explosive growth of the Internet of Things, which is forecasted by Gartner to reach 26 billion devices by 2020. Today, seemingly every commercially available product has a corresponding app or some sort of connectivity to the Web. Among the more common are security cameras, TVs, home alarms, refrigerators, garage door openers, remote power outlets, and thermostats.

BullGuard, a consumer security company headquartered in Europe, recently reported that vulnerabilities were discovered in 4.6% of 100,000 devices checked by the company’s free consumer scanner. With current estimates placing the number of IoT devices at 4 billion, this means there could be 184 million vulnerable devices being used today, providing a rich target for cyber criminals.

Even items with seemingly little intrinsic value are being manufactured with Internet connectivity. Take, for example, the BB-8TM droid toy built by Sphero. This commercially available app-controlled robotic ball has been painted like BB-8, the mischievous droid from Star Wars Episode VII: The Force Awakens, and marketed to people who want their very own droid.

In a recent report by Pen Test Partners, a U.K.-based vulnerability testing firm, security experts were able to exploit a bug and hack into a BB-8 toy through its integrated wireless communication system. This allowed them to inject code into the phone, which doubles as the device’s remote. Hackers were able to take full control of the device in what is called a man-in-the-middle attack.

A man-in-the-middle attack is similar to the game of “telephone” or “whisper down the lane” you played as a kid. A person shares a message and the recipient receives it, but in the process of relaying the message, each person seems to add or omit some crucial element of the message. Just imagine that instead of the sentence “Jane runs through the forest,” the message being interrupted and manipulated is a customer’s credit card number.

With the advent of wireless systems, an increasing number of entities are at risk for this kind of hack.

This is why it’s important to implement safeguards at home and in your agency to ensure security of the information you send, whether you’re sending instructions to a toy from your smartphone or an essential file from a PC to your server. Now more than ever, you need to make sure that commands are sent securely and reach the recipient in the way the sender intends. It’s important to encourage customers to do so as well.

Precautions such as remote monitoring and management that include intrusion detection, and other protocols that assist with cyber security, are good solutions to combat potential network security. (Your agency’s IT provider can discuss these issues and recommend the appropriate solution at the network level.)

Here are three simple tips for increasing your Internet of Things device’s security:

Use strong passwords on your devices. Many IoT devices arrive with weak passwords that can easily be hacked. If you are able to change the password on your device, do so.

Vary your passwords. Don’t use the same password for all of your IoT devices.

Watch for upgrades. As vulnerabilities in Internet devices are found, companies will be forced to issue critical updates, so assume updating will be needed on your devices.

The author

Jerry Fetty is founder and CEO of SMART I.T. Services, Inc., an independent agent-focused information technology service company and developer of myAGENCYcloud. Reach him at jerry.fetty@smartservices.com.

 

Previous Post

OPPORTUNITY OVERFLOW

Next Post

NEW AND EMERGING INSURANCE PRODUCTS FOR 2017

Next Post
Insurance products 2017

NEW AND EMERGING INSURANCE PRODUCTS FOR 2017

Please login to join discussion

FEATURES/ COLUMNS/ DEPARTMENTS

  • Agency of the Month (99)
  • Agency Partners (38)
  • Alternative Risk Transfer (28)
  • Benefits & Financial Services (159)
  • Benefits Lead (104)
  • Commercial Lines (122)
  • Court Decisions (335)
  • Coverage Concerns (175)
  • Excess and Specialty Lines (102)
  • From The Latest Issue (561)
  • General Articles (265)
  • Management (789)
  • Marketing (2)
  • Organizational Profiles (82)
  • Personal Lines (100)
  • Producers Blog (53)
  • RN Blog Top Q&A For Agents (84)
  • Specialty Lines (257)
  • Technology (175)
  • Trending Blogs (157)
  • Young Professionals (105)
  • Home
  • About
  • Publications
  • RN Newsletter
  • Products & Solutions
  • Media Kits
  • Contact Us
  • Shop

By continuing to browse the site, you agree to the data collection and processing practices disclosed in our recently updated privacy policy.

©The Rough Notes Company. No part of this publication may be reproduced, translated, stored in a database or retrieval system, or transmitted in any form by electronic, mechanical, photocopying, recording, or by other means, except as expressly permitted by the publisher. For permission contact Samuel W. Berman.

Sitemap

No Result
View All Result
  • Home
  • About
  • Publications
  • RN Newsletter
  • Products & Solutions
  • Media Kits
  • Contact Us
  • Shop
    • Catalog
    • Enter Promo Code
    • Pay Your Existing Bill Here

By continuing to browse the site, you agree to the data collection and processing practices disclosed in our recently updated privacy policy.

©The Rough Notes Company. No part of this publication may be reproduced, translated, stored in a database or retrieval system, or transmitted in any form by electronic, mechanical, photocopying, recording, or by other means, except as expressly permitted by the publisher. For permission contact Samuel W. Berman.

Sitemap