This article is from the source 'bbc' and was first published or seen on . It last changed over 40 days ago and won't be checked again for changes.
You can find the current article at its original source at http://www.bbc.co.uk/news/business-40281353
The article has changed 2 times. There is an RSS feed of changes available.
Previous version
1
Next version
Version 0 | Version 1 |
---|---|
'How foul-mouthed hackers messed up my life' | 'How foul-mouthed hackers messed up my life' |
(4 days later) | |
As our "smart" homes fill up with internet-connected devices, the risk grows that hackers will find weak points in our networks, steal our data and hijack our lives. What should we be doing about it? | As our "smart" homes fill up with internet-connected devices, the risk grows that hackers will find weak points in our networks, steal our data and hijack our lives. What should we be doing about it? |
It's not normally a good idea to sign off your Powerpoint presentation pitching for work with an expletive. | It's not normally a good idea to sign off your Powerpoint presentation pitching for work with an expletive. |
But this is what Gary Berman did - albeit unknowingly. | But this is what Gary Berman did - albeit unknowingly. |
Hackers had broken in to his home network via an internet-connected printer and sabotaged his files. Instead of signing off with "thank you", the hackers changed the first word to something offensive. | Hackers had broken in to his home network via an internet-connected printer and sabotaged his files. Instead of signing off with "thank you", the hackers changed the first word to something offensive. |
Unsurprisingly Gary, a Miami-based marketing entrepreneur, didn't win the $400,000 contract he was pitching for. | Unsurprisingly Gary, a Miami-based marketing entrepreneur, didn't win the $400,000 contract he was pitching for. |
"Who would think your printer could be used as an access point to your networks?" he tells the BBC. | "Who would think your printer could be used as an access point to your networks?" he tells the BBC. |
The trouble began last year when he noticed strange things happening: files went missing from his computer; his Facebook picture was changed; and texts from his daughter didn't reach him or arrived changed. | The trouble began last year when he noticed strange things happening: files went missing from his computer; his Facebook picture was changed; and texts from his daughter didn't reach him or arrived changed. |
"Nobody believed me," says Gary. "My wife and my brother thought I had lost my mind. They scheduled an appointment with a psychiatrist for me." | "Nobody believed me," says Gary. "My wife and my brother thought I had lost my mind. They scheduled an appointment with a psychiatrist for me." |
But he built up a body of evidence and called in a professional cybersecurity firm. It found that his email addresses had been compromised, his phone records hacked and altered, and an entire virtual internet interface created. | But he built up a body of evidence and called in a professional cybersecurity firm. It found that his email addresses had been compromised, his phone records hacked and altered, and an entire virtual internet interface created. |
"All my communications were going through a man-in-the-middle unauthorised server," he explains. | "All my communications were going through a man-in-the-middle unauthorised server," he explains. |
The cybersecurity firm changed and strengthened all the passwords for any connected devices on his home network and installed the latest generation firewall. | The cybersecurity firm changed and strengthened all the passwords for any connected devices on his home network and installed the latest generation firewall. |
Now Gary puts his alarming experience to good use as a victim's advocate, volunteering for the Institute of Responsible Online and Cell Phone Communication (IROC2), a non-profit organisation educating children about cyber safety and security. | Now Gary puts his alarming experience to good use as a victim's advocate, volunteering for the Institute of Responsible Online and Cell Phone Communication (IROC2), a non-profit organisation educating children about cyber safety and security. |
"I know I'm not alone," he says. | "I know I'm not alone," he says. |
Growing risk | Growing risk |
The risk of cyber-attack is growing along with the number of connected gadgets in the home - from thermostats to light bulbs, music systems to security cameras. | The risk of cyber-attack is growing along with the number of connected gadgets in the home - from thermostats to light bulbs, music systems to security cameras. |
While controlling your heating and lighting remotely with a smartphone might be convenient, if you're not switched-on to the security implications you could end up paying a high price for this convenience. | While controlling your heating and lighting remotely with a smartphone might be convenient, if you're not switched-on to the security implications you could end up paying a high price for this convenience. |
"Consumers understand if they purchase a product or service from a high-end brand, that product will have most likely been well-engineered and be relatively secure," says Michael Philpott of consultancy Ovum's smart home research team. | "Consumers understand if they purchase a product or service from a high-end brand, that product will have most likely been well-engineered and be relatively secure," says Michael Philpott of consultancy Ovum's smart home research team. |
"But at the same time they probably don't fully understand the consequences and potential risks of introducing other, cheaper products into their homes." | "But at the same time they probably don't fully understand the consequences and potential risks of introducing other, cheaper products into their homes." |
More Technology of Business | More Technology of Business |
Indeed, Symantec's latest internet security threat report finds that 40% of people are not "sufficiently aware" of the threats, and 79% say they have not even read a news article on the subject. | Indeed, Symantec's latest internet security threat report finds that 40% of people are not "sufficiently aware" of the threats, and 79% say they have not even read a news article on the subject. |
Yet poor security can have serious consequences, as Gary Berman discovered. | Yet poor security can have serious consequences, as Gary Berman discovered. |
The UK's National Cyber Security Centre has demonstrated how a connected doll could be hacked and used to open remote control door locks. | The UK's National Cyber Security Centre has demonstrated how a connected doll could be hacked and used to open remote control door locks. |
And poorly secured security cameras have been hijacked to carry out web attacks. | And poorly secured security cameras have been hijacked to carry out web attacks. |
Brian Geisel, chief executive of US internet of things (IoT) firm Geisel Software, argues that when it comes to the connected home, we are in similar position to the early days of laptop computers, when "virus scanners were just starting to emerge and home firewalls weren't even on the radar yet". | Brian Geisel, chief executive of US internet of things (IoT) firm Geisel Software, argues that when it comes to the connected home, we are in similar position to the early days of laptop computers, when "virus scanners were just starting to emerge and home firewalls weren't even on the radar yet". |
"IoT is in the same situation, where individuals with malicious intent are now acting faster than companies and consumers," he says. | "IoT is in the same situation, where individuals with malicious intent are now acting faster than companies and consumers," he says. |
It doesn't help that there are few internationally agreed security standards for these devices or that the tech giants - Google, Apple, Amazon, Samsung - are fighting to dominate the home market with their own systems. | It doesn't help that there are few internationally agreed security standards for these devices or that the tech giants - Google, Apple, Amazon, Samsung - are fighting to dominate the home market with their own systems. |
Practical steps | Practical steps |
So what should we be doing about it? | So what should we be doing about it? |
The standard advice is to change all the default usernames and passwords on our connected devices and make sure the firmware has been updated to the latest versions. | The standard advice is to change all the default usernames and passwords on our connected devices and make sure the firmware has been updated to the latest versions. |
"Just the simple step of changing that default username and password - to anything else - is a huge step in the right direction," Mr Geisel says. | "Just the simple step of changing that default username and password - to anything else - is a huge step in the right direction," Mr Geisel says. |
"Obviously, it's much better if you use a good password [a mix of upper and lower case letters, numbers and symbols] and have different passwords on different devices, but just getting a baseline of security is hugely important." | "Obviously, it's much better if you use a good password [a mix of upper and lower case letters, numbers and symbols] and have different passwords on different devices, but just getting a baseline of security is hugely important." |
Mr Geisel also advises being behind a firewall at all times. | Mr Geisel also advises being behind a firewall at all times. |
But for many non-technical people this is easier said than done. Even remembering passwords is difficult enough, which is why a password manager can be a good idea. | But for many non-technical people this is easier said than done. Even remembering passwords is difficult enough, which is why a password manager can be a good idea. |
These services generate and store strong passwords for each online device and account that you access. All you need to remember is your master password. Providers include LastPass, Dashlane, Sticky Password and LogMeOnce. | These services generate and store strong passwords for each online device and account that you access. All you need to remember is your master password. Providers include LastPass, Dashlane, Sticky Password and LogMeOnce. |
But Craig Spiezle, head of the Online Trust Alliance (OTA) at the Internet Society, says: "Expecting a home user to be a security expert is not reasonable. | But Craig Spiezle, head of the Online Trust Alliance (OTA) at the Internet Society, says: "Expecting a home user to be a security expert is not reasonable. |
"This is where we see the promise of 'dashboards' that can control all of the devices and alert users when a device may no longer be secure or is no longer being supported." | "This is where we see the promise of 'dashboards' that can control all of the devices and alert users when a device may no longer be secure or is no longer being supported." |
This means handing over your home network security to a trusted third party, either plugging in an extra box to your wi-fi router or replacing it with a security company's own router. | This means handing over your home network security to a trusted third party, either plugging in an extra box to your wi-fi router or replacing it with a security company's own router. |
Earlier this year, Symantec and Intel announced they were entering this market, joining existing providers such as BitDefender, Cujo, Home Halo, Eero, Idappcom, Trend Micro and others. | |
Typically, you can monitor your network via an app and also set parental controls to block access to certain devices or websites completely or within time limits you set. | Typically, you can monitor your network via an app and also set parental controls to block access to certain devices or websites completely or within time limits you set. |
But such guardians come at a price, typically £100 to £300 for the hardware, and often annual subscriptions on top. | But such guardians come at a price, typically £100 to £300 for the hardware, and often annual subscriptions on top. |
If this is beyond your budget, you should at least consider encrypting important files and storing them on a separate hard drive that isn't wi-fi enabled, or at least keeping them in a password-protected folder. | If this is beyond your budget, you should at least consider encrypting important files and storing them on a separate hard drive that isn't wi-fi enabled, or at least keeping them in a password-protected folder. |
Your home may be getting smarter; just make sure it's also getting safer. | Your home may be getting smarter; just make sure it's also getting safer. |
Previous version
1
Next version