{"id":12574,"date":"2023-06-27T08:17:15","date_gmt":"2023-06-27T11:17:15","guid":{"rendered":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=12574"},"modified":"2023-06-27T08:17:15","modified_gmt":"2023-06-27T11:17:15","slug":"recibiste-al-azar-un-reloj-inteligente-no-lo-encienda-advierten-los-investigadores","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=12574","title":{"rendered":"\u00bfRecibiste al azar un reloj inteligente? No lo encienda, advierten los investigadores"},"content":{"rendered":"<p>Los relojes inteligentes capaces de conectarse autom\u00e1ticamente a tel\u00e9fonos celulares y Wi-Fi, y luego obtener acceso a los datos del usuario, se env\u00edan a miembros del ej\u00e9rcito de los EE.UU. aparentemente al azar, lo que genera preocupaciones de seguridad cibern\u00e9tica.<\/p>\n<hr \/>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">WASHINGTON \u2014 Smartwatches capable of automatically connecting to cellphones and Wi-Fi, then gaining access to user data, are being shipped to members of the U.S. military seemingly at random, raising cybersecurity concerns.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">The\u00a0<a href=\"https:\/\/www.cid.army.mil\/Media\/Press-Center\/Article-Display\/Article\/3429159\/cid-lookout-unsolicited-smartwatches-received-by-mail\/\" target=\"_blank\" rel=\"noopener\">Department of the Army Criminal Investigation Division<\/a>, or CID, in an announcement last week warned the watches may contain malware, potentially granting whoever sent the peripherals \u201caccess to saved data to include banking information, contacts, and account information such as usernames and passwords.\u201d<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">A more innocuous tactic may also be to blame: so-called brushing, used in e-commerce to boost a seller\u2019s ratings through fake orders and reviews.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">The CID, an independent federal law enforcement agency consisting of thousands of personnel, did not say exactly\u00a0<a href=\"https:\/\/www.airforcetimes.com\/news\/your-air-force\/2023\/03\/09\/space-force-to-debut-new-fitness-tracking-pilot-program-within-weeks\/\" target=\"_blank\" rel=\"noopener\">how many smartwatches<\/a>\u00a0were so far distributed.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">Wearable technology and downloadable applications have long clashed with the national security ecosystem, where secrecy is paramount. Smartwatches and their software log personal info and location data, can record audio, and often lack a sufficient means to validate users.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">The\u00a0<a href=\"https:\/\/www.nytimes.com\/2018\/01\/29\/world\/middleeast\/strava-heat-map.html?smid=nytcore-ios-share&amp;referringSource=articleShare\" target=\"_blank\" rel=\"noopener\">New York Times<\/a>\u00a0in 2018 reported that Strava, a fitness app that posts a map of user activity, unwittingly revealed locations and habits of military bases and personnel, including those of American forces in the Middle East. And in 2020,\u00a0<a href=\"https:\/\/www.bellingcat.com\/news\/2020\/05\/18\/military-and-intelligence-personnel-can-be-tracked-with-the-untappd-beer-app\/#:~:text=The%20beer%2Drating%20app%20Untappd,intelligence%20locations%20around%20the%20world.\" target=\"_blank\" rel=\"noopener\">Bellingcat reported<\/a>\u00a0military and intelligence personnel could be tracked via Untappd, a beer-rating social network.<\/p>\n<p>The investigation division said troops that receive a smartwatch unsolicited should not turn the device on and should instead report the matter to a counterintelligence or security official.<\/p>\n<p><strong>Fuente: <\/strong><a href=\"https:\/\/www.c4isrnet.com\/cyber\/2023\/06\/22\/randomly-received-a-smartwatch-dont-turn-it-on-investigators-warn\/\" target=\"_blank\" rel=\"noopener\"><em>https:\/\/www.c4isrnet.com<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Los relojes inteligentes capaces de conectarse autom\u00e1ticamente a tel\u00e9fonos celulares y Wi-Fi, y luego obtener acceso a los datos del usuario, se env\u00edan a miembros&hellip; <\/p>\n","protected":false},"author":1,"featured_media":12575,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2,23],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/12574"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=12574"}],"version-history":[{"count":1,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/12574\/revisions"}],"predecessor-version":[{"id":12576,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/12574\/revisions\/12576"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/media\/12575"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=12574"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=12574"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=12574"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}