IoT Devices Like Sonos, Bose, Amazon Alexa & Google Home Have the Ability To Be Hacked
Trend Micro has found that some models of Sonos and Bose speakers—including the Sonos Play:1, the newer Sonos One, and Bose SoundTouch systems, can be accessed remotely, and then commandeered with to play any audio file that a hacker chooses. Only a small fraction of the total number of Bose and Sonos speakers were found to be accessible in their scans.
Many of IoT devices are running services on your network that offer remote access for you, but they also open the possibility for attackers and thieves to scan devices that have no ability to protect themselves.
But the researchers warn that anyone with a compromised device on their home network, or who has opened up their network to provide direct access to a server they’re running to the external internet—say, to host a game server or share files—has potentially left their fancy speakers vulnerable to an epic aural prank. Hackers Can Rickroll Thousands of Sonos and Bose Speakers Over the Internet
thumbnail courtesy of wired.com
More IoT Security TidBits From Around the Net
— Web Sécurité 🇫🇷 (@websecurite) December 31, 2017
I recently read an intriguing Harvard Business Review (HBR.org) article by Yevgeny Dibrov, entitled: “The Internet of Things is Going to Change Everything About Cybersecurity.” This well-written and thought-provoking opinion piece begins with the reality that cyberthreats are exploding globally and data breaches have led mainstream businesses to spend over $93 billion in 2017 on stopping cybercrime. Furthermore, cyberattacks against Internet of Things (IoT) devices are skyrocketing even faster, causing Congress to get involved. Gartner anticipates that a third of hacker attacks will target ‘shadow IT’ and IoT by 2020. In our scary new normal online, I certainly agree with Mr. Can We Take People Out of Internet of Things Security?
Have a Digital Living Security Specialist help Protect Your Network Today
— JasonYates75 (@Jason_Yates75) March 9, 2017
or running a game server – or a compromised IoT device already connected to that network, that combination could allow the hack. “The unfortunate reality is that these devices assume the network they’re sitting on is trusted,” Trend Micro … This creepy connected speaker hack is the latest IoT security risk
“Vulnerabilities in IoT devices and SCADA systems will lead to physical … as international tensions seem to be heating up. Financially motivated hacking groups have become increasingly organised over the years: just as many white collar workers … Security trends 2018: biometric hacking, state-sponsored attacks, daring cyber heists