See five ways to strengthen the security of the Internet of Things

Latest Phone number list discussion.
Post Reply
safi2021
Posts: 108
Joined: Wed Feb 08, 2023 5:22 am

See five ways to strengthen the security of the Internet of Things

Post by safi2021 »

Adopting good practices and avoiding open doors are among the recommendations of security experts. IDC predicts that by 2020 there will be 200 billion connected devices worldwide. And securing all these devices will be a real challenge. Check Point has just released what it considers key points for security in the Internet of Things”, in view of the set of the biggest threats and challenges related to the current trend towards the connectivity of all objects. According to Check Point, in the same way that the Internet of Things is making a more efficient and interconnected world possible, it is also providing cybercriminals with a better prepared network to launch their attacks. Recently, two attacks of great magnitude were reported. One of them was directed against some of the main retail chains in the United States, using a malware technique called “RAM scraping” and which allowed cybercriminals to penetrate directly into POS stores, stealing information about credit cards and personal data from more than 110 million customers.

In addition during Christmas more than 100,000 consumer devices, including Internet-connected refrigerators and smart televisions, helped send more than 750,000 malware emails around the world. “These examples prove two things: the first is that now that attacks against home devices connected to the Internet have started, they will only gain more and more force; and the second is Philippines WhatsApp Number List that the attackers are becoming more and more ingenious and the unconventional attack vectors more and more effective”, points out Rui Duro, Sales Manager at Check Point in Portugal. The five key ideas for Internet of Things security : ‒ The paths may not be direct, but they are effective Although, a priori, some devices may not be directly connected to the Internet, the systems that make them work end up doing so, to update themselves.

Image

This was the case of the attack on payment systems in stores (POSs) in the United States, where the criminals looked for a vulnerability in the Internet server of the company or the user and, once inside, roamed other local networks until reaching the devices or endpoints targeted by the attack. The conclusion to be drawn is that “current networks are more complex and connectivity allows opening paths that may not be as direct as the traditional ones, but, although longer, also more intelligent, effective and difficult to predict”, stresses Rui Duro. ‒ Biggest threat from botnets This common threat to both home and business PCs (which are compromised by being used as weapons to generate massive amounts of spam, phishing-type email messages or denial-of-service attacks) has enormous potential within the Internet of Everything.
Post Reply