- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
Malware attacks with computer worms or attacks of the Mirai type will occur regularly for the next one to three years, at least until effective security measures are used for most smart homes and other Internet-connected devices.
In 2021 we
don't expect much change as far as the transparency of the Internet of Things (IoT)
devices are concerned, especially how they are made, with whom they communicate
and what data they process, etc. Not knowing what those Sending back IoT
devices and the impact an attacker can have on the device (and thus on your
data and personal life) is still one of the biggest disadvantages of buying
anything “smart”.
Unknown Danger Thanks to IoT
Above all,
we have to be aware that unfortunately we will also be exposed to a greater -
in some cases - unknown digital threat in the next few years. After all,
most users still have no idea of the full extent of an IoT attack and/or
possible data leaks. Because they neither know which data is stored,
processed, or exchanged, nor how the security of this data is to be guaranteed.
Smart Home and Lack of IoT Security
In any
case, it is important to know that the IoT has a significant impact on data
protection, the consequences of which will stay with us for years to come. In
addition, the Internet of Things increases the risk that personal data will be
stolen over a long period of time in the event of a data breach.
If we
think, for example, of the amount of data that a single intelligent device
(e.g. a smartphone or even a smart TV) collects and how quickly these devices
multiply, we can see the huge amount of information that manufacturers have
about us, guess. The companies are trying to generate higher sales with
this data collected by the smart devices and
to open up new business areas. For example, with the information gathered
through smart TVs (how and when to use them, what you watch and care about,
etc.), manufacturers can make more profit in the after-sales market.
Brave New Digital Security
Although
institutions such as the European Union try to improve data protection and
enact appropriate laws (e.g. regarding the standard use of microphones), most
of the software development process remains completely opaque. As a result, nobody in the IoT world knows what technology is being used, how it is
being used, how long it will be supported, what information is being collected
and to whom it is being sent.
There are other initiatives,
but they are still in the early stages of development and implementation. In
the meantime, large amounts of data will continue to fill the dumps of
companies trying to capitalize on it. At the same time, the initiators of
DDoS attacks will exploit the growing number of vulnerable IoT devices of a
certain class, brand, or model and form large botnets for cyber attacks.
Find the best antivirus software to protect your data from cyber-attacks.
- Get link
- X
- Other Apps
Comments
Post a Comment