After the blackmail virus has been raging, how can the smart product security gap be filled?

This is an unusual night, even though it is as quiet as ever. The wicker outside the glass window swings regularly with the wind, and the medical staff chats in the monitoring room after checking the last shift. At this time, all 30 monitoring screens jumped to the same ward, which successfully attracted everyone's attention. In this picture, this patient is a research doctor. On the second day of the industry's highest scientific achievement award, he was unfortunately involved in a car accident. Fortunately, there is no danger to his life. However, the next screen made all medical staff stunned. The patient twitched in bed and seemed to have difficulty breathing. It looked very painful. When the doctors rushed to the ward as quickly as possible, the doctor had ended his young life.

This incident was identified by the police as a highly provocative murder! The murderer remotely controlled the feeding equipment through the network intrusion and killed the invisible. You might think that this is a scene that happens in the US blockbuster or Conan, but with the development of technology, more and more smart devices have indeed been exposed to hackers.

Since the outbreak of the bitcoin ransomware virus on May 12, it has only achieved a "glorious" record in just two days, causing more than 200,000 people in more than 150 countries around the world to be affected, and as of May 13 At 20 o'clock in the day, there are hundreds of thousands of machines organized by 29,372 organizations in China, including 4,341 educational and scientific research institutions. This is the hardest hit of the incident. At the same time, the virus is still spreading, universities and railway stations. Various areas such as self-service terminals, postal services, gas stations, hospitals, and government offices have been infringed. The scope of the ransomware network attack is so large that the impact is so bad that Europol calls it "unprecedented."

The ransomware virus is mainly based on ONION and WNCRY. After the poisoning, the disk file of the victim machine will be changed to the corresponding suffix. The pictures, documents, videos, compressed packages and other materials cannot be opened normally. The user can only decrypt and recover by paying a ransom. The two types of ransomware, the amount of extortion are 5 bitcoins and 300 US dollars, equivalent to 50,000 yuan and 2000 yuan.

The outbreak of the ransomware also lights up warning lights for high-speed development of intelligent devices. Once the high-risk vulnerabilities of smart products are exploited, they may be modified, configured, signaled, or even fully controlled, and the more intelligent, the more The greater the risk, the stronger the “destructive power”. A typical example of a children's smart watch is that after the smart watch is broken, it is likely to become a carry-on bug. At the same time, the contacts stored in the watch are easily tamper-evident. In the future, the mobile phone is also likely to become a mobile phone. The target of this type of ransomware.

With the introduction of artificial intelligence and big data, smart home appliances are currently moving from smart control to intelligent scenes, and market penetration and penetration rate are increasing year by year. So, do smart home appliances also have the risk of information being stolen and security? After communicating with Mr. Wang, the head of Haier U+ Standard Patent Department, the reporter learned that the answer is yes. In fact, the safety of home appliances has always existed. However, with the introduction of intelligent technology, after the home appliances access the network, in addition to the "traditional" electrical safety, there is an additional information security problem.

The information security of smart home appliances includes identity authentication, rights management, communication encryption, identity recognition, etc. If user information is lost, not only will the user's privacy be leaked, but also the electrical safety problem caused by information security problems, so smart home appliances The issue of information security cannot be ignored. At the "3·15" party last year, the problem of "hijacking" of smart devices has been exposed.

The reporter learned that there are some examples of cracking smart home products at the annual hacking conference. For these top hackers from all over the world, it is not difficult to crack smart appliances and smart devices on the market. Smart TVs also have the possibility of being hacked. Hackers can remotely control smart TVs and cameras on TVs. Intrusion TVs can install adware, while intrusion scenarios can watch indoors and record videos, which leads to users’ daily lives. Being "live", but not aware. US television producer Vizio has also been suspected of illegally collecting user ratings data. Vizio installed software on its smart TVs, collecting 11 million TV viewing data and sharing it with third parties without the user's knowledge.

Liu Buchen, a senior observer in the home appliance industry, also shared his views on the information security of smart home appliances. Liu Buchen believes that although the intelligentization of home appliances is the general trend, the premise of realizing "intelligence" should be based on the fact that user information is not infringed. The "smart" that is collected and easily broken is not really smart.

With the advancement of China Manufacturing 2025 strategy, in addition to the smart home access network, the intelligentization of equipment networking in the industrial field will become an inevitable trend. In the future, industrial control equipment including power, tobacco, rail transit, metallurgy, petroleum and petrochemical, steel, coal, advanced manufacturing, gas and other industries will become more connected to the Internet, office network, control network, equipment network and so on. But in the same way, in 2016, there have been incidents of hackers attacking power grid facilities and large-scale power outages in many countries and regions. According to statistics from relevant agencies, more than 70% of IoT devices have experienced security problems.

In the highly developed Internet era, the construction of network information security is particularly important. At the beginning of 2016, network security was officially included in the key construction direction of the “13th Five-Year Plan”, ranking among the 100 major construction projects of the government in the next five years. Six people, the government attaches importance to an unprecedented level. According to the data, the scale of China's information security industry in 2012 was only 15.726 billion yuan. In 2016, the market size has risen to 34.172 billion yuan, and the annual market growth rate is still on the rise. However, after deep communication with Mr. Wang, the reporter also learned that the current construction of information security in China is mostly in the Internet field, while smart home appliances, smart homes, and smart homes also have information security threats, but currently in this field. Policies and standards are still in the blank.

LED Flood Light

Photographic Lamp,Best Led Flood Light,Led Security Flood Light,Commercial Led Flood Lights

SHAOXING SHANGYU FEIXIANG PHOTOGRAPHIC CO.,LTD , https://www.flying-photography.com

This entry was posted in on