• About
  • Advertise
  • Contact
Tuesday, March 31, 2026
No Result
View All Result
NEWSLETTER
iotgeorgia
  • Home
  • Internet of Things
  • Security
  • Cloud Computing
  • Data Centers
  • Software
  • Mobile
  • Networking
  • Home
  • Internet of Things
  • Security
  • Cloud Computing
  • Data Centers
  • Software
  • Mobile
  • Networking
No Result
View All Result
iotgeorgia
No Result
View All Result
Home Security

How a tea kettle can kill your cloud

in Security
0
SHARES
9
VIEWS
Share on FacebookShare on Twitter

In a statement that speaks volume about the safety of the Internet of Things (IoT), it was revealed today (link via SlashDot) that Really Bad Software on a connected tea kettle was exploited to reveal Gmail passwords and other fun items. There’s even a YouTube Video demonstrating how fun it can be.

This bodes badly for systems security, whether it’s in a data center or in the cloud. What’s dramatic is that whether home worker or worker in the lunchroom of an organization, IoT devices, until vetted, represent astounding potential holes in systems security.

Unless your traffic is totally encrypted—with separate keys from each AP junction, correctly VLAN’d away from organizational assets—a simple tea kettle can be a back door to the network, and whatever resources it can find, rip by reading traffic flows, to anyone with a tasty antenna.

What is the meaning? IoT devices are going to be suspect, but even those that are built well—unlike the iKettle shown—will need updates because there will be new and more interesting crack methods that can apply. Those updates will need to come from vetted sources, with tamperproof delivery methods to send the update payloads to the devices.

In the interim, keys used in get/post commands to access cloud resources may need to be certificate-based/validated, with randomly rotated certificates to ensure that DNS and/or certificate authorities haven’t been compromised.

It all begs for a re-examination of how Internet Protocols work, and how we train IT staff to use them.

Hackfests like CCC, DEFCON, BlackHat, RSA, and other conferences need to continue their work. Certain retailers, however, need to consider the viability of the products on their shelf…perhaps a new datum for Underwriters Laboratories, the CSA, and other liability underwriting agency labs need to, so as to start something perhaps as important: IoT Pen Testing. No sticker? No importation.

Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.
Tags: How a tea kettle can kill your cloud
Next Post

Cyber insurers could help drive IoT standards

Recommended

The medical IoT market is to reach $158bn – driving demand for data analytics solutions

The medical IoT market is to reach $158bn – driving demand for data analytics solutions

Cisco will get stronger in IoT by buying Jasper for $1.4 billion

Popular News

    Facebook Twitter Youtube RSS

    Newsletter

    Subscribe our Newsletter for latest updates.

    Loading

    Category

    • AI
    • Careers
    • Cloud Computing
    • Connected Cars
    • Connected Vehicles
    • Data & Analytics
    • Data Center
    • Data Centers
    • Databases
    • Development
    • Enterprise
    • Hardware
    • Healthcare
    • IIoT
    • Infrastructure
    • Internet of Things
    • IoT
    • IT Leadership
    • Manufacturing
    • Mobile
    • Networking
    • Oil & Gas
    • Open Source
    • Security
    • Smart Cities
    • Smart Homes
    • Software
    • Software Development
    • Standards
    • Technology Industry
    • Uncategorized
    • Unified Communications
    • Virtualization
    • WAN
    • Wearables

    About Us

    Advance IOT information site of Georgia USA

    © 2024 https://iotgeorgia.com.

    No Result
    View All Result
    • Home
    • Internet of Things
    • Security
    • WAN
    • Cloud Computing
    • IoT
    • Data Centers
    • Software
    • Mobile
    • Networking

    © 2024 https://iotgeorgia.com.

    Login to your account below

    Forgotten Password?

    Fill the forms bellow to register

    All fields are required. Log In

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In