Industryweek 13526 Iot Security
Industryweek 13526 Iot Security
Industryweek 13526 Iot Security
Industryweek 13526 Iot Security
Industryweek 13526 Iot Security

The 10 Most Vulnerable IoT Security Targets

July 27, 2016
Contributors:

From autos to video cameras, the Internet of Things is exponentially increasing the number of potential targets for cyber-criminals, as we explain in this article with an accompanying poll.

Imagine the havoc that hackers could cause a nation by systematically targeting its power grid. Or the implications of criminals taking control over a city's network of video cameras. Or of a hacker taking control over a commercial airplane en route. While some of these risk scenarios may seem exaggerated, the ability of Stuxnet malware to cause physical damage has been shown inan Iranian nuclear facility. Last year, the Lloyds Business Blackout' report stated that the U.S. power grid itself was at risk of a Stuxnet-style attack, potentiallycausing $1 trillion in damages.

We need your help: After reading through the ten IoT security targetsdescribed in the article below, let us know your pick the item you think represents the biggest overall risk.

Please enable javascript! // >

transactionID

c8223a4c-7874-4cc9-a85b-ef0d748ba070

Source ID

workspace://SpacesStore/835dbe15-30ec-4895-b8f4-bf70ef1b1ce6
Content Summary: 
There is already an account of a hacked German steel mill, which caused massive damage to the facility.

2. Cars

Media Type

Image

Media Credit

iStock / welcomia

Privacy Settings

anonymous user

DataTable subpages

Media Image

transactionID

c8223a4c-7874-4cc9-a85b-ef0d748ba070

Source ID

workspace://SpacesStore/20910e32-251f-4f67-bf76-6666929b5b50
Content Summary: 
Two cybersecurity experts caused a ruckus in 2015 when they took control over a Jeep as it was cruising down the freeway. Although that was a stunt for Wired, the attack showed the potential for how dangerous such attacks could be in theory and led to its recall of 1.4 million vehicles.

3. Video Cameras

Media Type

Image

Media Credit

iStock / alice-photo

Privacy Settings

anonymous user

DataTable subpages

Media Image

transactionID

c8223a4c-7874-4cc9-a85b-ef0d748ba070

Source ID

workspace://SpacesStore/04b3aeab-17a3-4557-847c-5b43118fdfcb
Content Summary: 
Surveillance cameras are intended to make us more secure, and many cities across the U.S. have installed them, thanks to grants from the Department of Homeland Security. But the wireless networks used for transferring video signals can be insecure.

4. IoT-Enabled Spying and Potential for Cyberwarfare

Media Type

Image

Media Credit

iStock / the-lightwriter

Privacy Settings

anonymous user

DataTable subpages

Media Image

transactionID

c8223a4c-7874-4cc9-a85b-ef0d748ba070

Source ID

workspace://SpacesStore/ec523a1f-5b9c-4814-bc7e-26d785283200
Content Summary: 
Science fiction cyber-war is here, according to Oscar-winning filmmaker Alex Gibney whose recent Zero Days flick examines that Stuxnet worm that was far more advanced than ordinary malware.

5. Power Grids and Utilities

Media Type

Image

Media Credit

iStock / shih-wei

Privacy Settings

anonymous user

DataTable subpages

Media Image

transactionID

c8223a4c-7874-4cc9-a85b-ef0d748ba070

Source ID

workspace://SpacesStore/4743f273-87bd-4845-a77a-b6101bc2e3b5
Content Summary: 
In January, Ukraine accused Russian hackers of shutting down almost a quarter of its power infrastructure, knocking out at least 30 of its 135 power substations.

6. Buildings

Media Type

Image

Media Credit

iStock / chombosan

Privacy Settings

anonymous user

DataTable subpages

Media Image

transactionID

c8223a4c-7874-4cc9-a85b-ef0d748ba070

Source ID

workspace://SpacesStore/4e5d4967-99b5-4fe2-a3fb-6f9e97bec80d
Content Summary: 
The building industry has been slower than many to embrace digital technology. But that is beginning to change quickly as building automation technology rapidly gains in popularity. As more buildings become connected, the risk for exploits increases.

7. City Infrastructure and Transportation Networks

Media Type

Image

Media Credit

iStock / zhudifeng

Privacy Settings

anonymous user

DataTable subpages

Media Image

transactionID

c8223a4c-7874-4cc9-a85b-ef0d748ba070

Source ID

workspace://SpacesStore/3fb928ad-6553-4fe8-9856-86424689f655
Content Summary: 
Last year, Cesar Cerrudo, CTO of IOActive Labs proclaimed that many cities risk cyberattackseven those who dont consider themselves to be so-called smart cities.

8. Medical Devices and Hospitals

Media Type

Image

Media Credit

iStock / nevarpp

Privacy Settings

anonymous user

DataTable subpages

Media Image

transactionID

235e3f5e-3c87-477a-bc68-6b38438e0399

Source ID

workspace://SpacesStore/97f9cf79-01ca-4f20-b69b-66d6ba178a70
Content Summary: 
The security used in many medical devices and hospitals lags behind that used in many other industries. Not long ago, it was a common occurrence for some medical devices to have hard-coded passwords.

9. Airplanes

Media Type

Image

Media Credit

iStock / kotina

Privacy Settings

anonymous user

DataTable subpages

Media Image

transactionID

c8223a4c-7874-4cc9-a85b-ef0d748ba070

Source ID

workspace://SpacesStore/cf0fd5a9-987d-4474-aa8b-9f68b06205c4
Content Summary: 
Last year, Chris Roberts, a security researcher at One World Labs, made headlines after boasting that he hacked into a United Airlines jet and modified code on the crafts thrust management computer while onboard.

10. Retail Stores and Databases

Media Type

Image

Media Credit

iStock / Pavel_R

Privacy Settings

anonymous user

DataTable subpages

Media Image

transactionID

c8223a4c-7874-4cc9-a85b-ef0d748ba070

Source ID

workspace://SpacesStore/4df78dea-20ec-4495-a24f-1ad92e0092ac
Content Summary: 
Last year, Tripwire announced the results of a study conducted by Atomic Research that found that retail security lags behind that of many other sectors.

Popular Sponsored Recommendations

Empowering the Modern Workforce: The Power of Connected Worker Technologies

March 1, 2024
Explore real-world strategies to boost worker safety, collaboration, training, and productivity in manufacturing. Emphasizing Industry 4.0, we'll discuss digitalization and automation...

Adopting an Open Ecosystem: The Way Forward for Frontline Operations

March 11, 2024
Today's manufacturing tech stack thrives on connectivity, integrating new and legacy players for a seamless operation - not on monolithic systems. Embrace the future of frontline...

3 Best Practices to Create a Product-Centric Competitive Advantage with PRO.FILE PLM

Jan. 25, 2024
Gain insight on best practices and strategies you need to accelerate engineering change management and reduce time to market. Register now for your opportunity to accelerate your...

Transformative Capabilities for XaaS Models in Manufacturing

Feb. 14, 2024
The manufacturing sector is undergoing a pivotal shift toward "servitization," or enhancing product offerings with services and embracing a subscription model. This transition...

Voice your opinion!

To join the conversation, and become an exclusive member of IndustryWeek, create an account today!