Billions of opportunities to hack IoT means the next industrial revolution needs to disrupt itself first
We saw an excellent recent article from TechCrunch about how people intend to use the Internet of Things (IoT). With market hype as it is – Google Trends supports that in the graph below – we’ve recently covered everything from IoT lightbulbs to IoT basket balls to the Google backed IoT clothes even IoT for dogs, That’s not even taking into account the Internet of Things for industry.
From the article it’s apparent that people want security as a main feature – unsurprisingly with the press coverage of security hacks at major institutions this year.
This represents the really big problem for IoT – it will only take one article from the Daily Mail (known for its adherence to the truth) along the lines of “China hacked my dog and now I’ve lost my life savings” and the industry could go backward and self disrupt in a negative way.
From Techcrunch: The Internet of Things (IoT) presents a significant mix of opportunity and risk. Compared to the connected devices of the past, the gazillions of new IoT devices that are being predicted for our homes, transportation, cities, medical devices and elsewhere represent a unique set of security challenges for both companies and their users.
They also offer a host of new and attractive opportunity for attackers.
To start, IoT devices significantly expand the attack surface. Hackers can easily purchase any IoT device, which will often contain the same security features of other, identical devices already deployed in hundreds or even thousands of homes. Unlike servers or networking equipment, which are usually hacked through remote access points and reside in protected and monitored environments, IoT devices are more accessible to malicious threat actors.
The widespread availability and proliferation of these devices means that once a device is compromised, it’s very difficult for a company to flip a switch and update the millions of devices just like it sold around the world. It also means that hackers can use one insecure device to leapfrog their way into broader connected networks, allowing a single device to compromise sensitive data ranging from bank and health information to even access to broader corporate assets as the line between work and home continues to blur. . . click for more