Internet of Things Is the New Target of Cybercrime Attacks

The year 2015 marked the record of cyber attacks to Internet devices of Things (IoT) and the emergence of eight new families of malware.According to Symantec, a virtual security solutions company, these attacks are infesting a growing number of devices without their owners noticing.

If you have any questions about technology, write to 33giga@33giga.com.br and your questions can be answered.

The company claims cyberattacks have multiplied because of the lack of security in many of the Internet devices of Things.This feature makes them so easy targets that they can be invaded by preprogrammed malware with standard passwords of common use. Symantec experts believe that the main purpose of these criminals is to add the botnet to a botnet and use it to distribute denial of service (DDoS) – which would hinder remote access, for example.

In September alone, security vendor Sucuri found a major DDoS attack launched from three different botnet types (CCTV botnet networks, home router botnet, and compromised Web servers).

Vulnerable Devices

Most malware targets non-PC Things Internet devices.This is because many of them have limited operating system and processing power, which does not allow for the inclusion of any advanced security features.

Often these devices are designed to be plugged in and forgotten shortly after a very basic installation process.Some are either undergoing firmware updates and are simply replaced when they reach the end of their life cycle.The result of this superficial interaction is that any infection in these products can go unnoticed by the user, a characteristic that has become a great attraction for cyberattacks.

Tips to protect yourself:

– Check the capabilities and security features of a Things Internet device before purchase;

– Audit the IOT devices used in your network;

– Modify the default privacy and security settings for IoT devices according to your needs and according to security policy.Use strong, unique passwords for device accounts and Wi-Fi networks;

– Use strong encryption when setting up Wi-Fi network (WPA) access;

– Disable or protect remote access to IoT devices when not needed;

– Use wired connections instead of wireless whenever possible

– Regularly check the manufacturer’s website for firmware updates.

 

Gallery

WhatsApp will share your data with Facebook. How to say no …

WhatsApp will share your data with Facebook. How to say no ...

Source: securityaffairs.co

Internet of Things: Most Vulnerable IOT Technologies

Internet of Things: Most Vulnerable IOT Technologies

Source: blogs.systweak.com

Cost of cybercrime will grow from $3 trillion (2015) to $6 …

Cost of cybercrime will grow from $3 trillion (2015) to $6 ...

Source: securityaffairs.co

Hackers planning massive attacks against U.S. banks, is it …

Hackers planning massive attacks against U.S. banks, is it ...

Source: securityaffairs.co

iOS apps can access metadata revealing users’ locations …

iOS apps can access metadata revealing users' locations ...

Source: securityaffairs.co

A new BASHLITE variant infects devices running …

A new BASHLITE variant infects devices running ...

Source: securityaffairs.co

Healthcare breaches, cybercrime, ransomware to get worse …

Healthcare breaches, cybercrime, ransomware to get worse ...

Source: www.healthcareitnews.com

CareFirst data breach affects about 1.1M peopleSecurity …

CareFirst data breach affects about 1.1M peopleSecurity ...

Source: securityaffairs.co

AOL suffered a massive Data BreachSecurity Affairs

AOL suffered a massive Data BreachSecurity Affairs

Source: securityaffairs.co

Cyber Threats Archives

Cyber Threats Archives

Source: www.commtunnel.com

Bitcoin scams: Beware of crooks trying to steal your …

Bitcoin scams: Beware of crooks trying to steal your ...

Source: www.zdnet.com

Cybersecurity in 2014: A roundup of predictions

Cybersecurity in 2014: A roundup of predictions

Source: www.zdnet.com

IoT Cyber Security Improvement Act looks to bolster US …

IoT Cyber Security Improvement Act looks to bolster US ...

Source: limacharlienews.com

IBMVoice: How To Deter Cyber Criminals? "Good Guys" Will …

IBMVoice: How To Deter Cyber Criminals? "Good Guys" Will ...

Source: www.forbes.com

IoT ONE Index: Top 7 Cyber Attacks in 2015

IoT ONE Index: Top 7 Cyber Attacks in 2015

Source: community.iotone.com

Cyber security in australia and new zealand

Cyber security in australia and new zealand

Source: www.slideshare.net

‘Internet of things’ security introduction for fire, EMS …

'Internet of things' security introduction for fire, EMS ...

Source: www.firerescue1.com

GAO Assesses IoT Vulnerabilities

GAO Assesses IoT Vulnerabilities

Source: www.healthcareinfosecurity.com

The Evolution of Cyber Attacks

The Evolution of Cyber Attacks

Source: www.itbusinessedge.com

IoT Botnets Pose Big DDoS Threat

IoT Botnets Pose Big DDoS Threat

Source: blog.eplaceinc.com