The year 2015 marked the record of cyber attacks to Internet devices of Things (IoT) and the emergence of eight new families of malware.According to Symantec, a virtual security solutions company, these attacks are infesting a growing number of devices without their owners noticing.
If you have any questions about technology, write to email@example.com and your questions can be answered.
The company claims cyberattacks have multiplied because of the lack of security in many of the Internet devices of Things.This feature makes them so easy targets that they can be invaded by preprogrammed malware with standard passwords of common use. Symantec experts believe that the main purpose of these criminals is to add the botnet to a botnet and use it to distribute denial of service (DDoS) – which would hinder remote access, for example.
In September alone, security vendor Sucuri found a major DDoS attack launched from three different botnet types (CCTV botnet networks, home router botnet, and compromised Web servers).
Most malware targets non-PC Things Internet devices.This is because many of them have limited operating system and processing power, which does not allow for the inclusion of any advanced security features.
Often these devices are designed to be plugged in and forgotten shortly after a very basic installation process.Some are either undergoing firmware updates and are simply replaced when they reach the end of their life cycle.The result of this superficial interaction is that any infection in these products can go unnoticed by the user, a characteristic that has become a great attraction for cyberattacks.
Tips to protect yourself:
– Check the capabilities and security features of a Things Internet device before purchase;
– Audit the IOT devices used in your network;
– Modify the default privacy and security settings for IoT devices according to your needs and according to security policy.Use strong, unique passwords for device accounts and Wi-Fi networks;
– Use strong encryption when setting up Wi-Fi network (WPA) access;
– Disable or protect remote access to IoT devices when not needed;
– Use wired connections instead of wireless whenever possible
– Regularly check the manufacturer’s website for firmware updates.
WhatsApp will share your data with Facebook. How to say no …
Internet of Things: Most Vulnerable IOT Technologies
Cost of cybercrime will grow from $3 trillion (2015) to $6 …
Hackers planning massive attacks against U.S. banks, is it …
iOS apps can access metadata revealing users’ locations …
A new BASHLITE variant infects devices running …
Healthcare breaches, cybercrime, ransomware to get worse …
CareFirst data breach affects about 1.1M peopleSecurity …
AOL suffered a massive Data BreachSecurity Affairs
Cyber Threats Archives
Bitcoin scams: Beware of crooks trying to steal your …
Cybersecurity in 2014: A roundup of predictions
IoT Cyber Security Improvement Act looks to bolster US …
IBMVoice: How To Deter Cyber Criminals? "Good Guys" Will …
IoT ONE Index: Top 7 Cyber Attacks in 2015
Cyber security in australia and new zealand
‘Internet of things’ security introduction for fire, EMS …
GAO Assesses IoT Vulnerabilities
The Evolution of Cyber Attacks
IoT Botnets Pose Big DDoS Threat