7 transportation IoT predictions from Cisco
Cisco is one of the biggest proponents — and potential beneficiaries — of the Internet of Things (IoT). The networking giant is pushing IoT solutions in a number of areas, not least of which is the transporation sector.
To learn more about how the company sees the future of IoT playing out in the world of connected transporation, I spoke (via email) with Kyle Connor, Cisco’s transportation industry principal...
https://www.networkworld.com/article/3257769/internet-of-things/7-transportation-iot-predictions-from-cisco.html
Cisco is one of the biggest proponents — and potential beneficiaries — of the Internet of Things (IoT). The networking giant is pushing IoT solutions in a number of areas, not least of which is the transporation sector.
To learn more about how the company sees the future of IoT playing out in the world of connected transporation, I spoke (via email) with Kyle Connor, Cisco’s transportation industry principal...
https://www.networkworld.com/article/3257769/internet-of-things/7-transportation-iot-predictions-from-cisco.html
Interpol Tests Global Cops with IoT Simulation
Interpol last week held a simulated training exercise for global investigators designed to help overcome Internet of Things (IoT) skills shortages.
The international police organization’s annual Digital Security Challenge saw 43 cybercrime investigators and digital forensics experts from 23 countries face a simulated cyber-attack on a bank launched through an IoT device.
During the course of the simulation, investigators found that the malware was sent in an email attachment via a hacked webcam, and not direct from a computer.
Interpol claimed this is an increasingly popular tactic designed to obfuscate the source of attacks, but warned that police may not have the skills to forensically examine IoT devices.
“The ever-changing world of cybercrime is constantly presenting new challenges for law enforcement, but we cannot successfully counter them by working in isolation,” said Noboru, Nakatani, executive director of the Interpol Global Complex for Innovation.
“A multi-stakeholder approach which engages the expertise of the private sector is essential for anticipating new threats and ensuring police have access to the technology and knowledge necessary to detect and investigate cyber-attacks.”
The first two Digital Security Challenge exercises in 2016 and 2017 simulated cyber-blackmail involving Bitcoin and a ransomware attack, so the new focus on IoT is reflective of the changing nature of threats.
Last week, Trend Micro claimed in its 2017 roundup report that IoT devices are increasingly being “zombified” to mine crypto-currency and launch cyber-attacks like DDoS.
Hackers can target exposed IoT endpoints to infiltrate corporate networks, conscript into botnets or even interfere with critical infrastructure.
However, nearly half (49%) of all IoT “events” observed by the security vendor last year — amounting to a total of 45.6 million — involved crypto-currency mining.
Adam Brown, security solutions manager at Synopsys, argued that IoT attacks will continue until firmware flaws are addressed.
“Good practices by vendors around configuration and authentication need to be initiated or matured to prevent this in future,” he added.
"I would love to see certification for IoT devices become commonplace so that consumers can know that the devices are cyber-safe, much in the same way that if you buy a toy with a CE mark you know it has been through a process of assessment and it won’t, for example, poison anyone because it has lead in its paint.”
Interpol last week held a simulated training exercise for global investigators designed to help overcome Internet of Things (IoT) skills shortages.
The international police organization’s annual Digital Security Challenge saw 43 cybercrime investigators and digital forensics experts from 23 countries face a simulated cyber-attack on a bank launched through an IoT device.
During the course of the simulation, investigators found that the malware was sent in an email attachment via a hacked webcam, and not direct from a computer.
Interpol claimed this is an increasingly popular tactic designed to obfuscate the source of attacks, but warned that police may not have the skills to forensically examine IoT devices.
“The ever-changing world of cybercrime is constantly presenting new challenges for law enforcement, but we cannot successfully counter them by working in isolation,” said Noboru, Nakatani, executive director of the Interpol Global Complex for Innovation.
“A multi-stakeholder approach which engages the expertise of the private sector is essential for anticipating new threats and ensuring police have access to the technology and knowledge necessary to detect and investigate cyber-attacks.”
The first two Digital Security Challenge exercises in 2016 and 2017 simulated cyber-blackmail involving Bitcoin and a ransomware attack, so the new focus on IoT is reflective of the changing nature of threats.
Last week, Trend Micro claimed in its 2017 roundup report that IoT devices are increasingly being “zombified” to mine crypto-currency and launch cyber-attacks like DDoS.
Hackers can target exposed IoT endpoints to infiltrate corporate networks, conscript into botnets or even interfere with critical infrastructure.
However, nearly half (49%) of all IoT “events” observed by the security vendor last year — amounting to a total of 45.6 million — involved crypto-currency mining.
Adam Brown, security solutions manager at Synopsys, argued that IoT attacks will continue until firmware flaws are addressed.
“Good practices by vendors around configuration and authentication need to be initiated or matured to prevent this in future,” he added.
"I would love to see certification for IoT devices become commonplace so that consumers can know that the devices are cyber-safe, much in the same way that if you buy a toy with a CE mark you know it has been through a process of assessment and it won’t, for example, poison anyone because it has lead in its paint.”
Zerynth, an AWS Standard Technology Partner, provides a software development suite that enables Python programming on 32-bit microcontrollers and allows easy connectivity to AWS IoT services. As of this post, Zerynth supports more than 30 different hardware boards, making it a complete ecosystem for IoT development.
First steps to built your own factory within IoT technology
https://www.youtube.com/watch?v=coSKAvh49Fk
https://www.youtube.com/watch?v=coSKAvh49Fk
If you want to know MQTT more deeply, there is a book PDF from IBM
https://www.redbooks.ibm.com/redbooks/pdfs/sg248054.pdf
https://www.redbooks.ibm.com/redbooks/pdfs/sg248054.pdf
IoT adoption perceived as risky, as failures plague 64% of users worldwide
A new study from Dynatrace suggests that IoT adoption could be severely impacted by concerns over the consequences of IoT device failures.
New research suggests that the IoT market risks being undermined by device failures. According to Dynatrace, if device manufacturers, service providers, and platform creators don’t take steps to minimise the risk of IoT, they will harm their business.
Around 52% of consumers worldwide are now using IoT devices, yet 64% of those have already encountered performance issues – according to an independent global survey of 10,000 consumers.
On average, consumers experience 1.5 digital performance problems every day while 62% of people fear the number of issues they encounter, and the frequency will increase due to the rise of IoT.
For CTOs and IT leaders with products or services on the market that utilise IoT, this research is worth noting.
According to Dave Anderson, CMO of Dynatrace: “The delivery chain behind every connected device is extremely complex. Businesses are already struggling with cloud complexity, but IoT magnifies this a thousand times with sensors, masses of new data and dynamic containerised workloads.”
“Consumers are already reporting problems with everything from medical applications, smart meters, car door locks and virtual personal assistants, to smart thermostats and fridges. Their patience is at an all-time low, and they simply won’t tolerate a poor experience. Yet, we haven’t even seen the era of IoT take off to its full potential – it’s just getting started. The imperative is on companies to find ways to process, analyse and manage the IoT delivery chain holistically, and with deep insight, so they know exactly what’s happening and where issues are arising in real time. This is not an easy task.”
Key Findings
According to the report, 85% of respondents said they are concerned that self-driving cars will malfunction – leading to high-speed collisions.
When it comes to healthcare, 62% of consumers stated they would not trust IoT devices to administer medication; this sentiment is strongest in the 55+ age range, with 74% expressing distrust.
“The reality is IoT glitches could be fatal. Consumers are understandably concerned, and that’s why it will be important for the industry to demonstrate it’s taking a new, more robust approach to ensure software doesn’t compromise our safety,” added Anderson.
As well as the automotive and healthcare industry, the home is also set to be transformed by the IoT. However, the research revealed 83% of consumers are concerned about losing control of their smart home due to digital performance problems.
Managing IoT
According to Anderson: “The old ways of managing IT and software simply don’t work against this extremely convoluted IT environment. IoT creates many blind spots and an additional layer of complexity.”
A separate report from Veeam shows that downtime costs enterprise-sized organisations an average of $16 million annually.
According to Anderson: “The old ways of managing IT and software simply don’t work against this extremely convoluted IT environment. IoT creates many blind spots and an additional layer of complexity. That’s why the early, successful IoT adopters take the view that AI is the answer; to make sense of the complexity, map the IT environment end-to-end, pick up problems immediately and with precision, and offer up answers for fast resolution. That’s the only way to master the IoT era, which is already upon us. Consumers want perfect IoT experiences. Become masters of this new IT universe, or you’ll miss out on the opportunity IoT presents.”
A new study from Dynatrace suggests that IoT adoption could be severely impacted by concerns over the consequences of IoT device failures.
New research suggests that the IoT market risks being undermined by device failures. According to Dynatrace, if device manufacturers, service providers, and platform creators don’t take steps to minimise the risk of IoT, they will harm their business.
Around 52% of consumers worldwide are now using IoT devices, yet 64% of those have already encountered performance issues – according to an independent global survey of 10,000 consumers.
On average, consumers experience 1.5 digital performance problems every day while 62% of people fear the number of issues they encounter, and the frequency will increase due to the rise of IoT.
For CTOs and IT leaders with products or services on the market that utilise IoT, this research is worth noting.
According to Dave Anderson, CMO of Dynatrace: “The delivery chain behind every connected device is extremely complex. Businesses are already struggling with cloud complexity, but IoT magnifies this a thousand times with sensors, masses of new data and dynamic containerised workloads.”
“Consumers are already reporting problems with everything from medical applications, smart meters, car door locks and virtual personal assistants, to smart thermostats and fridges. Their patience is at an all-time low, and they simply won’t tolerate a poor experience. Yet, we haven’t even seen the era of IoT take off to its full potential – it’s just getting started. The imperative is on companies to find ways to process, analyse and manage the IoT delivery chain holistically, and with deep insight, so they know exactly what’s happening and where issues are arising in real time. This is not an easy task.”
Key Findings
According to the report, 85% of respondents said they are concerned that self-driving cars will malfunction – leading to high-speed collisions.
When it comes to healthcare, 62% of consumers stated they would not trust IoT devices to administer medication; this sentiment is strongest in the 55+ age range, with 74% expressing distrust.
“The reality is IoT glitches could be fatal. Consumers are understandably concerned, and that’s why it will be important for the industry to demonstrate it’s taking a new, more robust approach to ensure software doesn’t compromise our safety,” added Anderson.
As well as the automotive and healthcare industry, the home is also set to be transformed by the IoT. However, the research revealed 83% of consumers are concerned about losing control of their smart home due to digital performance problems.
Managing IoT
According to Anderson: “The old ways of managing IT and software simply don’t work against this extremely convoluted IT environment. IoT creates many blind spots and an additional layer of complexity.”
A separate report from Veeam shows that downtime costs enterprise-sized organisations an average of $16 million annually.
According to Anderson: “The old ways of managing IT and software simply don’t work against this extremely convoluted IT environment. IoT creates many blind spots and an additional layer of complexity. That’s why the early, successful IoT adopters take the view that AI is the answer; to make sense of the complexity, map the IT environment end-to-end, pick up problems immediately and with precision, and offer up answers for fast resolution. That’s the only way to master the IoT era, which is already upon us. Consumers want perfect IoT experiences. Become masters of this new IT universe, or you’ll miss out on the opportunity IoT presents.”
Forwarded from Deleted Account
Can any one know how to use GSM module and arduino together to transfer data like Bluetooth module? Is it possible? If yes please send any reference document.
Five IoT Predictions For 2019
(Part 1)
I don’t need to tell you that the IoT is growing at an exponential rate. Vehicles, wearable gadgets, RFID sensors and software are advancing past basic function and the network is growing to include even more advancements each day. I have more connected gadgets in my home this year than I did last and I'm sure I'm not alone. I'd also bet that these advancements will be even more commonplace in our homes, businesses and on the road in 2019. Let’s take a look at five IoT predictions for the coming year and how we can anticipate their impact.
IoT Prediction 1: Overall Growth Across the Board
When you look up IoT market and connectivity statistics you get a range of numbers all mostly in the billions. According to IT Pro, this year alone, around 3.6 billion devices that are connected to the Internet are used for daily tasks. Meaning total number of connected devices is bigger than that.
This means more data and more traffic on an already congested connected internet. In 2019, there will likely be a bigger push for 5G connectivity —adding a lane the congested web highway to handle the increase in devices. I also believe there will be a bigger push for edge computing. Data from IoT devices will be stored closer to the source—stealing business from data centers. To combat this, data centers and edge computing will need to work in harmony. More connected devices means change. Are you ready?
IoT Prediction 2: Deeper Penetration in the Manufacturing and Healthcare Industries
The IoT is a key driver of digital transformation in several industries, specifically manufacturing. Sensors, RFID tags, and smart beacons have already started the next industrial revolution. Market analysts predict the number of connected devices in the manufacturing industry will double between 2017 and 2020.
These devices are a total game changer for the industry disrupting every part of the production process from development to supply chain management. Manufacturers will be able to prevent delays, improve production performance, reduce equipment downtime and manage inventory. But it is not the only industry that will see a deeper penetration.
It’s been said by 2019 that 87% of healthcare organizations will have adopted IoT technology. The possibilities are endless for healthcare organizations and the IoT—smart pills, smart home care, personal healthcare management, electronic health records, managing sensitive data, and an overall higher degree of patient care.
(Part 1)
I don’t need to tell you that the IoT is growing at an exponential rate. Vehicles, wearable gadgets, RFID sensors and software are advancing past basic function and the network is growing to include even more advancements each day. I have more connected gadgets in my home this year than I did last and I'm sure I'm not alone. I'd also bet that these advancements will be even more commonplace in our homes, businesses and on the road in 2019. Let’s take a look at five IoT predictions for the coming year and how we can anticipate their impact.
IoT Prediction 1: Overall Growth Across the Board
When you look up IoT market and connectivity statistics you get a range of numbers all mostly in the billions. According to IT Pro, this year alone, around 3.6 billion devices that are connected to the Internet are used for daily tasks. Meaning total number of connected devices is bigger than that.
This means more data and more traffic on an already congested connected internet. In 2019, there will likely be a bigger push for 5G connectivity —adding a lane the congested web highway to handle the increase in devices. I also believe there will be a bigger push for edge computing. Data from IoT devices will be stored closer to the source—stealing business from data centers. To combat this, data centers and edge computing will need to work in harmony. More connected devices means change. Are you ready?
IoT Prediction 2: Deeper Penetration in the Manufacturing and Healthcare Industries
The IoT is a key driver of digital transformation in several industries, specifically manufacturing. Sensors, RFID tags, and smart beacons have already started the next industrial revolution. Market analysts predict the number of connected devices in the manufacturing industry will double between 2017 and 2020.
These devices are a total game changer for the industry disrupting every part of the production process from development to supply chain management. Manufacturers will be able to prevent delays, improve production performance, reduce equipment downtime and manage inventory. But it is not the only industry that will see a deeper penetration.
It’s been said by 2019 that 87% of healthcare organizations will have adopted IoT technology. The possibilities are endless for healthcare organizations and the IoT—smart pills, smart home care, personal healthcare management, electronic health records, managing sensitive data, and an overall higher degree of patient care.
Five IoT Predictions For 2019(Part2)
IoT Prediction 3: Increased Security at End Points
I’ll keep it simple: IoT devices leave you vulnerable to hacks and security issues. Think about it, how many IoT devices do you have? Do you know how they’re all secured? By 2019, I think we will increased security at all endpoints.
Hardware manufacturers like Cisco, HPE, Dell and more are building specific infrastructure for the edge deigned to be more physically rugged and secure, and security vendors will start to offer endpoint security solutions to their existing services to prevent data loss, give insights into network health and threat protection, include privileged user control and application whitelisting and control.
IoT Prediction 4: Smart Common Areas in Cities Around the World
Smart cities have been in a bit of a holding pattern recently. Sure we’ve mastered smart buildings and smart homes, but fully smart cities haven’t been come to fruition just yet. I think in 2019 we will start to see smart areas or neighborhoods within cities.
Sidewalk Labs, an Alphabet endeavor, is building a smart neighborhood in Toronto from the ground up. Smart sensors around the neighborhood will record everything from walking routes, shared car use, building occupancy, sewage flow, and temperature choice 24/7 with the goal of creating a place that’s comfortable, convenient, safe, and clean for those who live there. Once the model is perfected, it could be the model for other smart neighborhoods and eventually smart cities.
IoT Prediction 5: Increased Market Penetration of Connected Smart Cars
Even as a tech industry analyst, when I recently went car shopping, I was blown away by all of the IoT upgrades and how this has found its way into vehicles at every price point. While self-driving cars might be a normal occurrence in the next few years, I think that there are more possibilities with IoT inside the car for 2019.
Now tons of vehicles have a connected app that shows up to date diagnostic information about the car. This is done with IoT technology, which is the heart oft he connected vehicle. The ability to check tire pressure, oil level, fuel consumption and so many other things about a car and get the info sent to the palm of your hand. Also how it alerts the vehicle owner (or whomever you choose) when something is wrong with the engine. I can’t believe we ever lived without something like this.
Diagnostic information is not the only IoT advancement that we will see in the next year or so. Connected apps, voice search, and current traffic information are a few other things that will change the way we drive. Is it time to buy a new car? I think so. At the very least it is safe to say that IoT is changing the way we experience our automobiles.
These are only a few IoT predictions for 2019 and the years to come. There will likely be more advancements that we have only dreamt about until now. I personally can’t wait to see how the IoT continues to shake things up in industries everywhere.
IoT Prediction 3: Increased Security at End Points
I’ll keep it simple: IoT devices leave you vulnerable to hacks and security issues. Think about it, how many IoT devices do you have? Do you know how they’re all secured? By 2019, I think we will increased security at all endpoints.
Hardware manufacturers like Cisco, HPE, Dell and more are building specific infrastructure for the edge deigned to be more physically rugged and secure, and security vendors will start to offer endpoint security solutions to their existing services to prevent data loss, give insights into network health and threat protection, include privileged user control and application whitelisting and control.
IoT Prediction 4: Smart Common Areas in Cities Around the World
Smart cities have been in a bit of a holding pattern recently. Sure we’ve mastered smart buildings and smart homes, but fully smart cities haven’t been come to fruition just yet. I think in 2019 we will start to see smart areas or neighborhoods within cities.
Sidewalk Labs, an Alphabet endeavor, is building a smart neighborhood in Toronto from the ground up. Smart sensors around the neighborhood will record everything from walking routes, shared car use, building occupancy, sewage flow, and temperature choice 24/7 with the goal of creating a place that’s comfortable, convenient, safe, and clean for those who live there. Once the model is perfected, it could be the model for other smart neighborhoods and eventually smart cities.
IoT Prediction 5: Increased Market Penetration of Connected Smart Cars
Even as a tech industry analyst, when I recently went car shopping, I was blown away by all of the IoT upgrades and how this has found its way into vehicles at every price point. While self-driving cars might be a normal occurrence in the next few years, I think that there are more possibilities with IoT inside the car for 2019.
Now tons of vehicles have a connected app that shows up to date diagnostic information about the car. This is done with IoT technology, which is the heart oft he connected vehicle. The ability to check tire pressure, oil level, fuel consumption and so many other things about a car and get the info sent to the palm of your hand. Also how it alerts the vehicle owner (or whomever you choose) when something is wrong with the engine. I can’t believe we ever lived without something like this.
Diagnostic information is not the only IoT advancement that we will see in the next year or so. Connected apps, voice search, and current traffic information are a few other things that will change the way we drive. Is it time to buy a new car? I think so. At the very least it is safe to say that IoT is changing the way we experience our automobiles.
These are only a few IoT predictions for 2019 and the years to come. There will likely be more advancements that we have only dreamt about until now. I personally can’t wait to see how the IoT continues to shake things up in industries everywhere.
Hi, guys! Who want a FREE Casual SmartWatch? Only Today! Pay only for shipping! https://bit.ly/2PzbPfE
How Cryptojacking Can Corrupt the Internet of Things
Cyber criminals shut down parts of the Web in October 2016 by attacking the computers that serve as the internet’s switchboard. Their weapon of choice? Poorly secured Web cameras and other internet-connected gadgets that have collectively come to be known as the Internet of Things (IoT). The attack created a minor panic among people trying to visit Sony PlayStation Network, Twitter, GitHub and Spotify’s Web sites, but it had little long-term effect on internet use or the hijacked devices. Less than two years later, however, security experts are sounding the alarm over a new and possibly more nefarious type of IoT attack that “cryptojacks” smart devices, surreptitiously stealing their computing power to help cyber criminals make digital money.
Cryptocurrencies—so called because they use cryptography to secure transactions and mint new virtual coins—are generated when computers loaded with “cryptomining” software perform complex mathematical calculations. The calculations themselves serve no practical purpose, but the faster the computers complete them the more electronic money they make. Cryptojacking (a mashup of the words “cryptocurrency” and “hijacking”) occurs anytime someone uses another person’s internet-connected device without permission to “mine” Ethereum, Monero or some other virtual cash. (Bitcoins are a lot more valuable, but this well-known cryptocurrency is more likely to be created using warehouses of servers rather than someone’s stolen processing power).
Cyber criminals steal that power by sneaking malicious software containing cryptomining code onto PCs, smartphones and other internet-connected devices that, once infected, divert some of their processors’ capacity into solving the aforementioned calculations. Another type of cryptojacking attack occurs when internet users are tricked into visiting Web sites containing code that grabs part of their device’s processing power for as long as they visit the site. To entice people to stay, those sites tend to offer free pornography or pirated content. Victims usually have no idea their device has been coopted—although they might wonder why their batteries drain so quickly.
“When mining for gold, the person who works hardest with their pickaxe makes the most money,” says Richard Enbody, an associate computer science and engineering professor at Michigan State University. “In cryptomining, the pickaxe is an algorithm. The more complex the calculations it performs, the more processing power and energy it uses and the more money it earns.”
The latest trend is for criminals to infect appliances and other internet-connected devices with unwanted cryptomining software, Sherri Davidoff, CEO of cyber security firm LMG Security, said during a recent IoT cryptojacking webinar. “Many of these devices are unmonitored and highly vulnerable to simple attacks that exploit weak passwords and unpatched vulnerabilities,” Davidoff said. Nearly every case LMG is currently investigating has turned up cryptomining software, in addition to whatever other malware criminals installed on their victims’ computers, she added.
To test IoT devices’ susceptibility to having their processors hijacked to make cryptocurrency, Davidoff and her colleagues hacked into a Web camera in their lab and installed cryptomining software. After a day of calculating the camera managed to produce about three-quarters of a penny’s worth of Monero. Not exactly the motherlode, but those almost-pennies add up over time—especially if an attacker takes over thousands of Web cameras and leaves the software in place for a while, Davidoff said. Security cameras are a prime target because they connect to mostly unsecured public networks and are fairly generic—the same malware can be used to infect many different brands. In some cases these devices do not allow users to change their default security passwords.
Cyber criminals shut down parts of the Web in October 2016 by attacking the computers that serve as the internet’s switchboard. Their weapon of choice? Poorly secured Web cameras and other internet-connected gadgets that have collectively come to be known as the Internet of Things (IoT). The attack created a minor panic among people trying to visit Sony PlayStation Network, Twitter, GitHub and Spotify’s Web sites, but it had little long-term effect on internet use or the hijacked devices. Less than two years later, however, security experts are sounding the alarm over a new and possibly more nefarious type of IoT attack that “cryptojacks” smart devices, surreptitiously stealing their computing power to help cyber criminals make digital money.
Cryptocurrencies—so called because they use cryptography to secure transactions and mint new virtual coins—are generated when computers loaded with “cryptomining” software perform complex mathematical calculations. The calculations themselves serve no practical purpose, but the faster the computers complete them the more electronic money they make. Cryptojacking (a mashup of the words “cryptocurrency” and “hijacking”) occurs anytime someone uses another person’s internet-connected device without permission to “mine” Ethereum, Monero or some other virtual cash. (Bitcoins are a lot more valuable, but this well-known cryptocurrency is more likely to be created using warehouses of servers rather than someone’s stolen processing power).
Cyber criminals steal that power by sneaking malicious software containing cryptomining code onto PCs, smartphones and other internet-connected devices that, once infected, divert some of their processors’ capacity into solving the aforementioned calculations. Another type of cryptojacking attack occurs when internet users are tricked into visiting Web sites containing code that grabs part of their device’s processing power for as long as they visit the site. To entice people to stay, those sites tend to offer free pornography or pirated content. Victims usually have no idea their device has been coopted—although they might wonder why their batteries drain so quickly.
“When mining for gold, the person who works hardest with their pickaxe makes the most money,” says Richard Enbody, an associate computer science and engineering professor at Michigan State University. “In cryptomining, the pickaxe is an algorithm. The more complex the calculations it performs, the more processing power and energy it uses and the more money it earns.”
The latest trend is for criminals to infect appliances and other internet-connected devices with unwanted cryptomining software, Sherri Davidoff, CEO of cyber security firm LMG Security, said during a recent IoT cryptojacking webinar. “Many of these devices are unmonitored and highly vulnerable to simple attacks that exploit weak passwords and unpatched vulnerabilities,” Davidoff said. Nearly every case LMG is currently investigating has turned up cryptomining software, in addition to whatever other malware criminals installed on their victims’ computers, she added.
To test IoT devices’ susceptibility to having their processors hijacked to make cryptocurrency, Davidoff and her colleagues hacked into a Web camera in their lab and installed cryptomining software. After a day of calculating the camera managed to produce about three-quarters of a penny’s worth of Monero. Not exactly the motherlode, but those almost-pennies add up over time—especially if an attacker takes over thousands of Web cameras and leaves the software in place for a while, Davidoff said. Security cameras are a prime target because they connect to mostly unsecured public networks and are fairly generic—the same malware can be used to infect many different brands. In some cases these devices do not allow users to change their default security passwords.