Explore the latest news and trends  

Sign up for our weekly security newsletter

Be the first to receive important updates on security


Google Search, an Easy Way for Hacking Most Smart Devices


Security researchers loosened the parts of a number of common devices as well as reverse engineered their operations to easily uncover severe problems of security. It's very simple for criminals to hack smart devices, specifically home CCTVs and baby monitors because the researchers discovered security flaws in networks and devices installed inside Internet of Things or smart homes.


For such hacks, tools solely required are just about one finger while the hacker's nose too is sufficient for typing the device's model as well as its brand, this together with one connected browser. Doing a Google hunt of the information regarding the device produces a forum or website in just minutes containing a post that describes the way for getting inside that device with the aid of default admin user id and passphrase of the manufacturer.


The same information can be used for any thief, paedophile, usual Peeping Tom or ex-spouse for gaining admission into any smart device fixed at a residence. Even some criminal else government organization, by using the said username/password combinations, control a number of devices simultaneously for the purpose of mining data, spying, else execute worldwide cyber attacks. Fastcodesign.com posted this, March 14, 2018.


Senior Lecturer Yossi Oren at Israel's Ben-Gurion University (BGU) of the Negev says it's indeed scary how without any difficulty a paedophile, voyeur or criminal can get hold over the said devices.


According to Oren, by working the said devices inside the university lab, it was possible for playing high decibel music via one baby monitor, start off a camera, or stop a thermostat, remotely.


Merely thirty minutes are required for finding passwords related to the majority of the IoT appliances, with a few obtained solely via the brand's search in Google.


The researchers' group at BGU further found that a person seeking to access an IoT needn't do the entire hacking process himself: Everywhere, hackers apply the same procedure immediately on entering the market. Thereafter they distribute info related to the password openly. Thus for staying safe, users must regularly update their software, while like always set hard-to-crack passwords and separate ones for separate devices.

» SPAMfighter News - 3/20/2018

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page