[ToScenes] ?s=scenes With Smartthings - Viral News
from an ocean of unsecured internet-connected devices.
Many of these devices were reportedly smart home gadgets using standardized manufacturer default passwords. It's alarmingly easy for hackers to search the web for these devices and then, with the right malware, take control of them en masse. From there, the hackers can use their army of hacked devices, called a "botnet," to overwhelm whatever server they aim it at.
The episode raises some serious questions about the smart home. More and more people are filling their living spaces with an ever-increasing number of internet-connected devices. That means more potential fodder for the next big botnet, and fears of even bigger attacks in the future.
The Internet is having a bad day after massive cyberattack
The entire Web seemed to be broken Friday for users in the United States, with many major sites suffering outages.by Bridget Carey 1:27
There are a couple of key points to remember right off the bat to keep your home secure. First, and most importantly, strong passwords are an obvious must, both for your devices and for your home Wi-Fi network. Along those lines, you should also flat-out avoid gadgets that will let you operate them using a default, hard-coded password that comes with the device (usually something along the lines of "admin"). Gadgets like those are ripe targets for the kinds of attacks we saw last week.
Additionally, if you're looking to incorporate multiple devices into a larger platform, you should consider how thoroughly that platform vets third-party devices. Some set high standards for product security and won't let third-party devices onto the bandwagon until they meet them. Others simply want as many compatible gadgets on the market as possible.
Most of the smart home devices used in last week's attacks seem to come from lesser known manufacturers with shoddy security practices, including Chinese webcam-maker Xiongmai. But what about those larger platforms? What are they doing to keep your devices and your data secure? Are they at risk, too?
Let's break it down, one at a time.