{"id":2906,"date":"2018-04-27T14:41:02","date_gmt":"2018-04-27T17:41:02","guid":{"rendered":"https:\/\/www.nachodelatorre.com.ar\/mosconi\/?p=2906"},"modified":"2018-04-27T14:41:02","modified_gmt":"2018-04-27T17:41:02","slug":"5-riesgos-de-ciberseguridad-para-el-mundo-de-iot","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=2906","title":{"rendered":"5 Riesgos de ciberseguridad para el mundo de IoT"},"content":{"rendered":"<p>En la \u00faltima d\u00e9cada IoT ha sido relevante para hacer nuestras vidas m\u00e1s f\u00e1ciles, pero un gran poder trae aparejada una gran responsabilidad, sobre todo con los riesgos de ciberseguridad.<!--more--><\/p>\n<p><img loading=\"lazy\" class=\" alignright\" src=\"http:\/\/i2.wp.com\/iotworm.com\/wp-content\/uploads\/2015\/07\/Cybersecurity_image.jpg?resize=730%2C430\" alt=\"Machine to Machine and Internet of Things security\" width=\"399\" height=\"235\" \/>IoT, in the past decade, been getting more of a necessity rather than a luxury or something which makes our lives easier.<\/p>\n<p>The thing is that with great power, comes great responsibility. With many devices connected to the internet, many cybersecurity risks arise as well.<\/p>\n<p>Those include devices from our everyday gadgets which can get infected with things like adware, to even our car. No need to worry, I\u2019ll mention how to potentially protect yourself from these risks and how to\u00a0<a href=\"https:\/\/www.malwarefox.com\/adware-removal-tool\/\" target=\"_blank\" rel=\"noopener noreferrer\">remove adware<\/a>.<\/p>\n<p><strong>Summary<\/strong><\/p>\n<p>All in all, these are the cybersecurity risks that we\u2019ll be talking about:<br \/>\n1. Malware<br \/>\n2. Mobile Devices<br \/>\n3. Cloud Services<br \/>\n4. Privacy<br \/>\n5. Offline Life<\/p>\n<p><strong>Malware<\/strong><\/p>\n<p>Malicious programs are mostly targeted towards desktops, laptops, and smartphones. Mostly because important information is stored on these kinds of devices which you won\u2019t find on a printer or anything like that.<br \/>\nInformation like credit card numbers, documents, personal stuff, you see where this is going right? The good thing is that you can prevent a malware infection or remove one with free\u00a0<a href=\"https:\/\/www.malwarefox.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">malware removal<\/a>\u00a0program.<\/p>\n<p><strong>How Dangerous is Malware for IoT and how Much Damage can it Really Cause?<\/strong><\/p>\n<p>The answer varies from \u201cgenerally harmless\u201d to \u201cdangerous enough to bring down hospitals, banks, and big companies\u201d.<br \/>\nFor an example, the adware which I mentioned above is generally harmless \u2013 even though it\u2019s still recommended to remove it.<br \/>\nRansomware, on the other hand, has brought down whole banks and hospitals by encrypting important data on their devices.<br \/>\nThe absolute basic steps for keeping your personal devices safe from malware include updating your software, using a security configuration, and relying on common sense.<\/p>\n<p><strong>Mobile Devices<\/strong><\/p>\n<p>Mobile devices are extremely useful in our daily lives. The problem is that always being connected to the internet in access points that are not entirely trustworthy, poses a bit of a security risk.<br \/>\nFor an example, various people are connected to that cafeteria Wi-Fi which you also just connected into. How do you know that one of them is not \u201ceavesdropping\u201d on your network activities? In most cases, you don\u2019t.<\/p>\n<p><strong>Security Precautions<\/strong><\/p>\n<p>So, what do you do? Stop relying on mobile devices? Not necessarily. For your average person, using a VPN and connecting on WPA\/2 networks is more than enough to keep you safe.<br \/>\nAnd just generally be careful while using your mobile devices. It\u2019s true that many security risks come with using them but most of them rely on actions from the user.<\/p>\n<p><strong>Cloud Services<\/strong><\/p>\n<p>Cloud services are extremely useful for storing data and keeping it safe. They also enable you to access all of your files, from all of your devices, in one single place. Can\u2019t deny that this comes in handy.<\/p>\n<p>However, they are essentially nothing more than computers which store your data remotely and send it over to you.<\/p>\n<p>Which means that they are also susceptible to things like malware, hackers, and any other danger which lurks online.<\/p>\n<p>Don\u2019t get me wrong. Tech giants like Google, Apple, and any other big company are sure to try and keep your data as safe as possible.<\/p>\n<p>But, with many devices connected to each other and with each device being connected to numerous services, accidents are bound to happen one day.<\/p>\n<p>For an example, back in 2014, someone managed to hack into the iCloud accounts of many celebrities. He stole numerous of their nude photos which they had stored there and uploaded them to the world wide web for everyone to see.<\/p>\n<p>Something which humouristically came to be known as \u201cThe fappening\u201d. We\u2019re not celebrities, but something similar could always happen to us.<\/p>\n<p><strong>Security Precautions<\/strong><\/p>\n<p>The only thing that you can do from your part is to choose a reputable company for cloud servicing and use strong passwords.<\/p>\n<p>Privacy<br \/>\nIoT has been getting closer and closer to our personal lives. We use our devices to store pictures of us, personal information, banking information, and many other things.<\/p>\n<p>Now we\u2019re taking it to the next level with home assistants, security cameras, and other gadgets which have deeply have access to our privacy.<\/p>\n<p>I think that you can already see how this plays a major cybersecurity risk when it comes to our privacy.<br \/>\nThe microphone of a home assistant can be used to spy on our daily lives. Same goes with security cameras.<\/p>\n<p>Truth be told, hacking into a home assistant is something that I haven\u2019t heard about yet, but there\u2019s a first time for everything.<\/p>\n<p>When it comes to security cameras, thousands of them are already hacked. Not only that, but the ones who did the job also made them accessible through the world wide web.<\/p>\n<p>I won\u2019t give a link to these for obvious reasons, but you can always Google it if you don\u2019t believe me.<\/p>\n<p><strong>Security Precautions<\/strong><\/p>\n<p>When it comes to simple remote access devices like security cameras, just use strong passwords.<br \/>\nProtecting your privacy in complex devices like computers is well, more complex than that. I\u2019m afraid that you\u2019ll have to make your own research that subject is not directly related to this article.<\/p>\n<p><strong>Offline Life<\/strong><\/p>\n<p>This is more of a future subject, but as silly as it sounds, IoT can also affect our offline life. Stealing personal property is the first thing that comes to mind. Such as household items or even your car.<\/p>\n<p>Yes, your car is not connected to the internet, but a phone which unlocks it might be. In fact, the Tesla Model 3 already works in that way.<\/p>\n<p>Say that someone figures out a way to make his phone unlock your car and boom, he now owns it.<\/p>\n<p>To my knowledge, nothing like that has happened yet. As mentioned above, it\u2019s more of a futuristic risk as the majority of us don\u2019t use cars and houses which get unlocked with a phone.<\/p>\n<p><strong>Fuente:<\/strong>\u00a0<em><a href=\"http:\/\/iotworm.com\/5-cyber-security-risks-iot-world\/\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/iotworm.com<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>En la \u00faltima d\u00e9cada IoT ha sido relevante para hacer nuestras vidas m\u00e1s f\u00e1ciles, pero un gran poder trae aparejada una gran responsabilidad, sobre todo&hellip; <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[23,29],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/2906"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2906"}],"version-history":[{"count":0,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/2906\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2906"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2906"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2906"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}