Accendo Reliability

Your Reliability Engineering Professional Development Site

  • Home
  • About
    • Contributors
  • Reliability.fm
    • Speaking Of Reliability
    • Rooted in Reliability: The Plant Performance Podcast
    • Quality during Design
    • Critical Talks
    • Dare to Know
    • Maintenance Disrupted
    • Metal Conversations
    • The Leadership Connection
    • Practical Reliability Podcast
    • Reliability Matters
    • Reliability it Matters
    • Maintenance Mavericks Podcast
    • Women in Maintenance
    • Accendo Reliability Webinar Series
    • Asset Reliability @ Work
  • Articles
    • CRE Preparation Notes
    • on Leadership & Career
      • Advanced Engineering Culture
      • Engineering Leadership
      • Managing in the 2000s
      • Product Development and Process Improvement
    • on Maintenance Reliability
      • Aasan Asset Management
      • CMMS and Reliability
      • Conscious Asset
      • EAM & CMMS
      • Everyday RCM
      • History of Maintenance Management
      • Life Cycle Asset Management
      • Maintenance and Reliability
      • Maintenance Management
      • Plant Maintenance
      • Process Plant Reliability Engineering
      • ReliabilityXperience
      • RCM BlitzĀ®
      • Rob’s Reliability Project
      • The Intelligent Transformer Blog
    • on Product Reliability
      • Accelerated Reliability
      • Achieving the Benefits of Reliability
      • Apex Ridge
      • Metals Engineering and Product Reliability
      • Musings on Reliability and Maintenance Topics
      • Product Validation
      • Reliability Engineering Insights
      • Reliability in Emerging Technology
    • on Risk & Safety
      • CERMĀ® Risk Insights
      • Equipment Risk and Reliability in Downhole Applications
      • Operational Risk Process Safety
    • on Systems Thinking
      • Communicating with FINESSE
      • The RCA
    • on Tools & Techniques
      • Big Data & Analytics
      • Experimental Design for NPD
      • Innovative Thinking in Reliability and Durability
      • Inside and Beyond HALT
      • Inside FMEA
      • Integral Concepts
      • Learning from Failures
      • Progress in Field Reliability?
      • Reliability Engineering Using Python
      • Reliability Reflections
      • Testing 1 2 3
      • The Manufacturing Academy
  • eBooks
  • Resources
    • Accendo Authors
    • FMEA Resources
    • Feed Forward Publications
    • Openings
    • Books
    • Webinars
    • Journals
    • Higher Education
    • Podcasts
  • Courses
    • 14 Ways to Acquire Reliability Engineering Knowledge
    • Reliability Analysis Methods online course
    • Measurement System Assessment
    • SPC-Process Capability Course
    • Design of Experiments
    • Foundations of RCM online course
    • Quality during Design Journey
    • Reliability Engineering Statistics
    • Quality Engineering Statistics
    • An Introduction to Reliability Engineering
    • An Introduction to Quality Engineering
    • Process Capability Analysis course
    • Root Cause Analysis and the 8D Corrective Action Process course
    • Return on Investment online course
    • CRE Preparation Online Course
    • Quondam Courses
  • Webinars
    • Upcoming Live Events
  • Calendar
    • Call for Papers Listing
    • Upcoming Webinars
    • Webinar Calendar
  • Login
    • Member Home

by Greg Hutchins Leave a Comment

Beware the Walls May Be Listening and the Appliances Are Loose

Beware the Walls May Be Listening and the Appliances Are Loose

Guest Post byĀ Ed PerkinsĀ (first posted on CERMĀ Ā® RISK INSIGHTS – reposted here with permission)

Unsuspecting consumers, thinking they have found a bargain, or that they have joined the latest gadget trend, or both, can be unpleasantly surprised, according to recent revelations on how mobile and IoT (Internet of Things) devices can have built-in security issues.

Here is a recap of some if the issues found in consumer gadgets:

Smart TVs:Ā A recent news report that Samsung ā€œsmartā€ TVs can listen to conversations in the room[1]. This became hot news during that week. Samsung published a ā€œclarificationā€ on its website[2].

The following language in Samsung’s privacy policy has led to confusion:

ā€œPlease be aware that if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party through your use of Voice Recognition.ā€

Samsung Smart TVs that offer voice recognition search functions have a microphone in the remote control which captures what is said (ex: ā€œRecommend a good Sci-Fi movieā€) and sends it to a server for processing. The server is hosted by a third party. So potentially, if you have this function enabled, the remote could be listening to sounds in the room and transmitting this to the server.

Wireless Doorbell:Ā Researchers in the UK discovered that a smart doorbell can be made to reveal the wireless password for the homeowner [3]. The doorbell is only secured to its back plate by two standard screws. An attacker can gain access to the homeowner’s wireless network by unscrewing the unit, pressing the setup button and accessing the configuration URL. Once they have the password, they put the back on and there is no indication there was any tampering. A firmware update was released that fixes this issue, two week after it was reported to the company.

Wireless Home Alarm:Ā A security consultant discovered that a wireless home alarm used unencrypted communications, so an attacker can listen to the signal and pick up the PIN from messages [4]. Once they have the password, when the owner is away they can shut off the alarm and burglarize the home. To make matters worse, the units are not fixable, since the electronics has a one-time programmable chip so the only recourse is to remove it and purchase a new alarm for a different vendor with hopefully a more secure design.

Cheap Tablets:Ā In the midst of the 2014 Christmas shopping season, a security form reviewed the inherent security of some of the cheap Android tablets being sold by the big name retailers, and found ā€œmost of the devices ship with vulnerabilities and security misconfigurations; a few even include security backdoorsā€. Unsuspecting consumers who purchase these cheap tablets are likely inviting risks of mobile data & passwords theft [5].

Wireless Mouse Jacking:Ā This week it was reported that most wireless mice and keyboards use unencrypted signals to connect to the USB receiver [6]. Thus is it is possible for someone up to 100 yards away to send commands into your computer (ā€œmouse jackingā€). While it may be difficult to physically get into position to attempt this, a determined hacker can easily spoof the mouse or keyboard to send signals into the computer. Some devices use Bluetooth, so it could be possible for someone to infect a Smartphone to be used to propagate the attack on the owner’s computer. Or if your computer is in located near a window.

The lesson here, is that once again buyer must be aware – but with technology items, how can the average consumer be aware if there are hidden risks? Do we need a ā€˜good housekeeping seal’ for cyber devices?

References

[1] Your Samsung SmartTV Is Spying on You, Basically

http://www.thedailybeast.com/articles/2015/02/05/your-samsung-smarttv-is-spying-on-you-basically.html

[2] Samsung Smart TVs Do Not Monitor Living Room Conversations

https://news.samsung.com/global/samsung-smart-tvs-do-not-monitor-living-room-conversations

[3] Steal your Wi-Fi key from your doorbell? IoT WTF!

https://www.pentestpartners.com/blog/steal-your-wi-fi-key-from-your-doorbell-iot-wtf/

[4] Using SimpliSafe Home Security? — You’re Screwed! It’s Easy to Hack & Can’t be Patched

http://thehackernews.com/2016/02/hack-home-security-alarm.html

[5] Santa or the Grinch: Android Tablet Analysis for the 2014 Holiday Season

https://bluebox.com/santa-or-the-grinch-android-tablet-analysis-2014/

[6] Countless computers vulnerable to MouseJack attack through wireless mice and keyboards

http://www.networkworld.com/article/3036463/mobile-security/countless-computers-vulnerable-to-mousejack-attack-through-wireless-mice-and-keyboards.html

Filed Under: Articles, CERMĀ® Risk Insights, on Risk & Safety Tagged With: IoT

« Tolerance Specifications Impact on Reliability
Failure Analysis of a Gearbox, Fan, Bearing and Shaft »

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

CERMĀ® Risk Insights series Article by Greg Hutchins, Editor and noted guest authors

Join Accendo

Receive information and updates about articles and many other resources offered by Accendo Reliability by becoming a member.

It’s free and only takes a minute.

Join Today

Recent Articles

  • Risk Prioritization in FMEA – a Summary
  • What Are Best Practices for Facilitating Qualitative Assessments?
  • So, What’s Still Wrong with Maintenance
  • Foundation of Great Project Outcomes – Structures
  • What is the Difference Between Quality Assurance and Quality Control?

© 2023 FMS Reliability Ā· Privacy Policy Ā· Terms of Service Ā· Cookies Policy

This site uses cookies to give you a better experience, analyze site traffic, and gain insight to products or offers that may interest you. By continuing, you consent to the use of cookies. Learn how we use cookies, how they work, and how to set your browser preferences by reading ourĀ Cookies Policy.