{"id":739,"date":"2019-08-23T05:57:00","date_gmt":"2019-08-23T05:57:00","guid":{"rendered":"https:\/\/www.appstudio.ca\/blog\/?p=739"},"modified":"2022-11-18T09:35:05","modified_gmt":"2022-11-18T09:35:05","slug":"the-importance-of-security-in-iot-devices","status":"publish","type":"post","link":"https:\/\/www.appstudio.ca\/blog\/the-importance-of-security-in-iot-devices\/","title":{"rendered":"The Importance of Security in IoT Devices"},"content":{"rendered":"\n

Microsoft officials said on Monday that they had located hackers working for the Russian government using printers, video decoders, and other IoT-related devices as a means to break into specific computer networks. Researchers at the Redmond giant discovered the attacks in April when a VoIP phone, office printer, and video decoder at various customer sites communicated with servers belonging to \u201cStrontium\u201d, a group of Russian government hackers known as \u201cFancy Bear\u201d or \u201cAPT28\u201d.<\/p>\n\n\n\n

\u201cThese devices with IoT application development<\/a><\/strong> have become entry points where attackers have established a presence on the network and have continued to look for more ways to access,\u201d Microsoft Threat Intelligence Center officials said in a statement. \u201cAfter the hacker successfully established network access, a simple network scan allowed him to search for and discover other insecure devices and move around the network for more privileged accounts and to grant access to higher-value data.\u201d<\/p>\n\n\n\n

Last year, the FBI concluded that the hacking group was behind the infection of more than 500,000 routers in 54 countries. Nicknamed \u201cVPNFilter\u201d, the malware was known as the Swiss army hacking method. Advanced features included the ability to monitor, log, or modify the traffic that passes between network terminals, sites, or industrial control systems using Modbus serial communication protocol. The FBI, with the help of Cisco\u2019s Talos security group involved in the IoT mobile app development<\/strong>, neutralized VPNFilter. <\/p>\n\n\n\n

Microsoft has notified device manufacturers that they might consider adding new protections. Monday\u2019s report also provided IP addresses and scripts that organizations can use to detect if they were also targeted or infected. In addition, the report reminded people that despite Strontium\u2019s above-average hacking skills, an IoT device <\/a><\/strong>is usually all it takes to gain access to a segmented network. That is, others may try to do this.<\/p>\n\n\n\n

\u201cWhile a great part of the business centers around equipment embeds dangers, we can see from this model adversaries are glad to investigate easier design and security issues to accomplish their objectives,\u201d the report noted. \u201cThese simple attacks taking advantage of poor device management tend to expand as more IoT devices are deployed in enterprise environments.\u201d<\/p>\n\n\n\n

IoT devices are no longer a niche market. The tendency to have all our devices interconnected, together with the cheaper manufacturing of these technologies, is driving their takeoff enormously. In addition, it is expected that soon this will go further with the implementation of the IPv6 address space and the deployment of 5G technologies in mobile networks.<\/p>\n\n\n\n

They emerged from the convergence of microelectronic systems, and wireless and internet services offered by IoT companies<\/strong>, which resulted in a large network of everyday objects capable of communicating with each other, without the need for human intervention. From a refrigerator that can inform us remotely if it is losing cold, to a biochip implanted in our body notifying us about the level of blood glucose or heart rate, through the great fashion of wearables with their measurements on our daily physical activity.<\/p>\n\n\n\n

The relevance of IoT technologies, as well as the advantages they offer in our daily lives, is a reality. However, they also have several drawbacks to consider. The information handled by these devices is increasingly sensitive or relevant, so keeping them safe is vitally important.<\/p>\n\n\n\n

The growth of these devices also means, an increase in the number of new vulnerabilities that affect them.<\/p>\n\n\n\n

Carrying out a correct security policy is a complicated task due to ignorance. This affects consumers, but more developers and manufacturers. Here at AppStudio, we always try to increase awareness among users and consumers and strive hard to make manufacturers and developers think about security as the most important aspect.<\/p>\n\n\n\n

The great challenge of the next decade for IoT development<\/a> services<\/strong> will be IoT security because it is estimated that by 2020, 38.5 billion devices will be connected to the network. <\/p>\n\n\n\n

In North America, a cyber-attack is reported every 20 seconds,\u201d said Shawn Kimbuli, director of the Global Research and Analysis Team at Kaspersky Lab.<\/p>\n\n\n\n

Viruses, phishing, theft, or loss of data are the most common; they are aimed at companies, individuals, government organizations, or corporations.<\/p>\n\n\n\n

Uber, for example, had to pay hackers US $ 100,000 to recover 57 million data, from drivers and users.<\/p>\n\n\n\n

In 2015, the Grabit spying campaign was discovered. Business teams were infected; the information on your hard drive was stolen. \u201cA chemical company whose name was not disclosed suffered patent theft through this system,\u201d an expert told a national newspaper.<\/p>\n\n\n\n

More is needed to establish protocols. IoT companies in Toronto<\/strong> must build trust and integrate habits to prevent and mitigate risks.<\/p>\n\n\n\n

Table of Contents<\/p>\n\n\n\n