California
Super Star Member
- Joined
- Jan 22, 2004
- Messages
- 14,715
- Location
- An hour north of San Francisco
- Tractor
- Yanmar YM240 Yanmar YM186D
I've wondered if putting them on the Guest channel with a different password is enough to discourage an opportunistic hacker. I'm a half mile off the county road so drive-by hacking into the wifi is unlikely. But what are the chances of coming in from the cloud, through the IoT software, and into the desktop or the OS?And yes, as @Frankenkubota points out all the "Internet of Things" gizmos (Alexa, Ring, security cameras, etc.) are a security nightmare. If you have them, I really think they should be on their own segregated VLAN that is different from your "normal" home network, and preferably also separate from any guest network(s) that you have. The IoT gizmos are too inexpensive for much in the way of security to begin with and there is no recurring revenue to support patching and fixing them going forward.
Personally, I think that if you have IoT gizmos, you probably need to upgrade to a more fully featured router and WiFi access points.
Somewhere I read a post by a Smart Plug owner who discovered it was uploading vast quantities of data to the Mother Ship for no apparent reason. He quit using it.
Added: Here's a current instance of remote devices being centrally controlled to store malware, ie used for storage and possibly a DoS attack, rather than for the purpose of stealing from the infected host device.
FBI Raids Chinese Point-of-Sale Giant PAX Technology – Krebs on Security
krebsonsecurity.com
... the FBI began investigating PAX after a major U.S. payment processor started asking questions about unusual network packets originating from the company’s payment terminals.
According to that source, the payment processor found that the PAX terminals were being used both as a malware “dropper” — a repository for malicious files — and as “command-and-control” locations for staging attacks and collecting information.
Last edited: