• About
  • Advertise
  • Contact
Saturday, April 18, 2026
No Result
View All Result
NEWSLETTER
iotwashington
  • Home
  • Internet of Things
  • Security
  • WAN
  • Cloud Computing
  • Data Centers
  • Mobile
  • Networking
  • Software
  • Home
  • Internet of Things
  • Security
  • WAN
  • Cloud Computing
  • Data Centers
  • Mobile
  • Networking
  • Software
No Result
View All Result
iotwashington
No Result
View All Result
Home Security

How a tea kettle can kill your cloud

in Security
0
SHARES
6
VIEWS
Share on FacebookShare on Twitter

In a statement that speaks volume about the safety of the Internet of Things (IoT), it was revealed today (link via SlashDot) that Really Bad Software on a connected tea kettle was exploited to reveal Gmail passwords and other fun items. There’s even a YouTube Video demonstrating how fun it can be.

This bodes badly for systems security, whether it’s in a data center or in the cloud. What’s dramatic is that whether home worker or worker in the lunchroom of an organization, IoT devices, until vetted, represent astounding potential holes in systems security.

Unless your traffic is totally encrypted—with separate keys from each AP junction, correctly VLAN’d away from organizational assets—a simple tea kettle can be a back door to the network, and whatever resources it can find, rip by reading traffic flows, to anyone with a tasty antenna.

What is the meaning? IoT devices are going to be suspect, but even those that are built well—unlike the iKettle shown—will need updates because there will be new and more interesting crack methods that can apply. Those updates will need to come from vetted sources, with tamperproof delivery methods to send the update payloads to the devices.

In the interim, keys used in get/post commands to access cloud resources may need to be certificate-based/validated, with randomly rotated certificates to ensure that DNS and/or certificate authorities haven’t been compromised.

It all begs for a re-examination of how Internet Protocols work, and how we train IT staff to use them.

Hackfests like CCC, DEFCON, BlackHat, RSA, and other conferences need to continue their work. Certain retailers, however, need to consider the viability of the products on their shelf…perhaps a new datum for Underwriters Laboratories, the CSA, and other liability underwriting agency labs need to, so as to start something perhaps as important: IoT Pen Testing. No sticker? No importation.

Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.
Download WordPress Themes
Free Download WordPress Themes
Download Premium WordPress Themes Free
Download Premium WordPress Themes Free
online free course
download karbonn firmware
Download WordPress Themes Free
free download udemy course
Tags: How a tea kettle can kill your cloud
Next Post

Cyber insurers could help drive IoT standards

Recommended

Self-driving warehouse robots give Giant Eagle a lift

DARPA: Monitoring heat, electromagnetic and sound outputs could assess safety of IoT devices

Facebook Twitter Youtube RSS

Newsletter

Subscribe our Newsletter for latest updates.

Loading

Category

  • AI
  • Careers
  • Cloud Computing
  • Connected Cars
  • Connected Vehicles
  • Data & Analytics
  • Data Center
  • Data Centers
  • Databases
  • Development
  • Enterprise
  • Hardware
  • Healthcare
  • IIoT
  • Infrastructure
  • Internet of Things
  • IoT
  • IT Leadership
  • Manufacturing
  • Mobile
  • Networking
  • Oil & Gas
  • Open Source
  • Security
  • Smart Cities
  • Smart Homes
  • Software
  • Software Development
  • Standards
  • Technology Industry
  • Uncategorized
  • Unified Communications
  • Virtualization
  • WAN
  • Wearables

About Us

Advance IOT information site of Washington USA

© 2024 iotwashington.com.

No Result
View All Result
  • Home
  • Internet of Things
  • Security
  • WAN
  • IoT
  • Cloud Computing
  • Data Centers
  • Mobile
  • Networking
  • Software

© 2024 iotwashington.com.

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In