Prior to the day, the United States two network providers suffered cyber attacks, many well-known Web site can not be landed a time, known as half of the U.S. Internet was paralyzed. After the survey shows that this is the use of viruses infected with Internet equipment, and then use these devices to launch cyber attacks.
Internet security sources, the infection of the virus in the Internet of things devices, including the network camera, etc. One hundred thousand. The main reason is the device connected to the Internet there are a lot of loopholes, some vulnerabilities are common vulnerabilities, easy to control, and then become the Internet attack “ messenger ”.
“ networking equipment now are basically in ‘ &rsquo streaking;. ” focus on networking security investment in the founding partner of the founding partner of the founding partner Lu Yizhou bluntly told reporters.
He told reporters cited an example, there are vendors in order to detect the air-conditioning noise to improve the products, the installation of air conditioning in the sound collection of equipment, these devices can return the number of air-conditioning decibels. But is such an equipment, will soon be outside safety experts found a loophole, only need a small plan, you can turn it into &ldquo ” detectaphone;. When each air conditioner can become a bug, think about how horrible it is?
This is not alarmist statements of a school, Ann day laboratory chief technical architect Xiao Xinguang also told reporters, now many people have bought a sweeping robot, the robot has Mike, camera and other devices, also need to connect to the network, which is equivalent to a potential monitoring equipment. Once the attack, family privacy is no place to hide.
As for now a lot of people are using the smart socket, it is possible to become a security risk. Experts said that security vulnerabilities smart socket now is more, if be hacked by light, can make a batch of users without power, weight can make the socket overload fever, become incendiary weapon &rdquo “.
As of now heady new energy vehicles Tesla, although its security team is strong enough, but still be broken off. Can imagine, if the hacker can remote control of a smart car, for the owners will be a terrible thing.
“ PC and mobile device vulnerabilities, most is money. But things really light loopholes. ” Lu Yizhou told reporters, “ however, it is now a lot of things to the transformation of the enterprise, most of them are white home appliance business background. Their security capability is a serious problem, the inherent thinking is the pursuit of the standardization of hardware, and the hacker is like the standardization of the hardware. ”
In this regard, network security experts, in the founder Zhang Yaojiang told reporters that the current network equipment manufacturers, rarely pay attention and introduce the safety control, networking equipment users are generally lack of safety awareness, the security situation is bleak as can be imagined.
So, as a consumer, how do we deal with these possible &ldquo &rdquo smart device; streaking;? Many industry insiders told reporters, for the safety of the Internet of things, consumers can do not much. Xiao Xinguang told reporters, “ unlike computers, mobile phones and other devices such as download anti-virus software and other mature security measures, the intelligent hardware can not form an interaction. ”
Therefore, for those possible security issues, &ldquo networking equipment manufacturers; responsibility ”. Many security experts, need safety responsibility by changing the rules, laws and other measures to clear the intelligent hardware vendors, especially for privacy, data collection and reasonable and legitimate use of safekeeping etc.. It is also an effective way to promote the safety and cost of the manufacturers, and to guard against the possible risks associated with them.
Follow us：Please take a look at our micro-public：Scan QR code，The public,：ilvruan
Copyright notice：All copyright belongs to the original author of this article，Copyright belongs to the original author all，Welcome to share this article，Reprinted please keep source!