Page 14 - index
P. 14
create a personal area network (PAN), which is allows each person to use a mobile device as a
networking hub. What you end up with is a lot of data transmitting across a lot of devices using a lot
of different protocols.
And…lots of opportunities for that data to be intercepted.
The World Economic Forum released its Global Risk Report which states that IoT hacking is ‘very
likely’ and points out that today’s Internet infrastructure was simply not created to handle this kind of
flood of new devices. CES2015 also reinforced this sentiment, with FTC chairwoman Edith
Ramirez warning that attackers could “access and misuse personal information collected and
transmitted by [IoT] devices.” While Smart TV’s have access to a fairly safe means of transmission
via Wi-Fi or hard-wired Ethernet, the market for IoT devices is growing by the day. These devices
have equally loose privacy policies and are constantly sharing data between devices and apps; all
of this activity is putting data at risk for exploit.
Another example of this data dragnet is Uber, the car service that has made transportation a
socially connected service. No more hailing a cab, now you simply request an Uber driver from your
phone. Uber made the news late last year for it’s questionable data collection. While, sure, it needs
your geolocation to send a car, it also take the opportunity to look at your contacts, your geolocation
history, what apps you have installed – even your neighbor’s Wi-Fi information. The list is endless
and has nothing to do with a car service. It’s clear that data is a secondary business for Uber. And,
looking at their privacy policy - that you agree to in order to use the service – they are able to share
it. This means your data drifting around the Ethernet to third parties that that may “perform other
administrative services”. Whatever the hell that means.
For certain, data analytics is big business. But, this is your data that is flying around out there. As it
makes it’s stops between your service provider and whatever third, fourth, or fifth parties their
sending it to, this data as more opportunity than ever to intercepted and captured or for your
personal area network devices to be compromised.
Read your privacy policies. It will be up to each of us to determine what we’re willing to give up in
the name of modern convenience.
About the Author
Chris Rouland is a cybersecurity expert and entrepreneur. He is currently the founder and CEO of
Bastille, the first company to detect and mitigate threats to the Internet of Things.
14 Cyber Warnings E-Magazine – February 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide