Sophos security expert James Lyne spoke during a keynote session on the Internet of Things at this year’s edition of Mobile World Congress, sharing a sampling of his research on the startling security immaturity of IoT devices.
Although James says he’s a big proponent of the IoT, of mobile applications, and the possibilities these technologies bring, his research shows how a number of them fail even the most basic security tests.
According to James, many of today’s IoT devices make it too easy for malicious hackers. James has seen massive security failures such as devices with hardcoded passwords, some exposed to vulnerabilities that should have been patched long ago, and others communicating across the open Internet unencrypted.
You can watch James’s brief but entertaining talk in the video embedded below. He explains his discoveries and shares his insights into how and why IoT and mobile security went so wrong, and what we can do to get it right.
The Internet of Things (or IoT for short) is rapidly expanding to include an unprecedented number of connected devices. All the smart things coming online need to be secured, but sadly, security seems to be low on the list of priorities for IoT manufacturers and developers.
There’s a very broad array of consumer and industrial applications for the IoT: wearables, TVs, thermostats, lighting, security cameras, drug infusion pumps, electricity meters, toys, cars, and much more. What can be done to make sure our devices are safe from snoops and hackers?
James Lyne, Sophos global head of security research, addresses this important issue during a keynote session at Mobile World Congress, taking place the week of 22-25 February.
The security of mobile devices and the Internet of Things is surprisingly lax, especially compared to traditional desktops. James Lyne, global head of security research at Sophos, proved just how insecure these devices really are, in a presentation at the Mobile World Congress in Barcelona.
In his live demonstration, James demonstrated hacks that a modestly talented cybercriminal could use to compromise mobile devices and Internet-connected closed-circuit cameras (CCTV).
In our video below, you can watch James hack into an Android tablet over Wi-Fi to record video and audio, and see how insecure CCTV cameras that use weak or no passwords can be breached from the other side of the world.