Remember BlueBorne, the vulnerability that allowed hackers to infiltrate an estimated 5 billion gadgets using only a Bluetooth connection?
SEE ALSO: The Eufy Genie is here to grant all of your smart house-related wishes — and it's 58% offToday, Armis Security announced that an estimated 20 million Amazon Echo and Google Home devices were vulnerable to attacks via the BlueBorne exploit. The disclosure was coordinated with Google and Amazon, and both companies have already released patches to fix the issue on their respective devices.
The report highlights a growing concern over the security of smart home devices, whose operating systems are often updated less frequently than desktop computers and cell phones, and can be left vulnerable to hackers.
For the uninitiated, BlueBorne is the name used to describe eight vulnerabilities that allow hackers to seize control of a device using just a Bluetooth connection. Attacks can be executed remotely, and without any signal to the user. The scariest part is that once a hacker gains control of one Bluetooth-enabled device, it can be spread to any device on the same network.
The exploit is terrifying for several reasons: For starters, hackers can essentially reprogram your devices to feed you incorrect information, from false traffic reports to an inaccurate schedules.
More malicious hackers can also use BlueBorne to spy on you. The vulnerability allows exploiters to record and transmit recordings to anywhere in the world without the device owner's knowledge. This means individuals can have personal details compromised, and businesses can lose confidential information.
What's perhaps most shocking is that exploited devices can be used in a massive denial-of-service (DDoS) attack. Last year's infamous assault of Dyn's servers, which brought down such websites as Twitter, Netflix, and Reddit for most of the day, was accomplished with the help of over 100,000 hijacked Internet of Things devices.
"This is the tip of the iceberg," Armis Security cofounder and CTO, Nadir Izrael, told Mashable. "The fact that we're picking up on all these things leads us to believe that these smart devices are vulnerable in many, many other ways."
Smart home devices tend to be especially vulnerable to breaches, Nadir added, because of the infrequency with which their software are updated. Compared to your phone or computer, most Google Homes and Amazon Echos run very old operating systems that aren't adapted to address new security concerns.
SEE ALSO: Google Home trick lets you 'broadcast' messages from your phoneWhen you operate an Internet of Things device, be it a Google Home or a smart refrigerator, it's important to treat it like you would a phone or computer. Keep it updated, turn off Bluetooth when you're not using it, and pay attention to which functions are enabled.
And when purchasing smart home devices, make sure to consider security. "The first thing people should do when they're buying devices is say, 'How is this device secured?'" said Armis vice president of marketing Michael Parker. "Second, ask 'How does it connect? Bluetooth or Wi-Fi?' And finally, 'Can I turn this connectivity off?'"
"We need to start having people asking these questions," he said, "and the market will start answering." If you're worried about being vulnerable to a BlueBorne hack and want check your own network's security, you can download the BlueBorne Vulnerability Scanner from the Google Play Store.
Copyright © 2023 Powered by
Bluetooth exploit puts Amazon Echo and Google Home devices at risk-寸地尺天网
sitemap
文章
6652
浏览
437
获赞
21
Instagram will let you livestream for up to 4 hours and archive for a month
Instagram is taking several steps to make life for creators on the platform easier during the COVID-The dreaded 'someone is typing' dots have entered the impeachment drama
Text messages briefly took center stage during the first part of Donald Trump's impeachment hearingsDC’s ‘Doom Patrol’ is the rare superhero show that understands trauma
Superhero stories have taught us that surviving the worst circumstances can be powerfully transformaReview: Puppr is an app that gives you the tools to train your dog
Training a dog can be an intimidating task, especially if your dog is something of a handful. That'sLyft dips toes into food delivery for first time
Lyft has added e-scooters, e-bikes, car rentals, and other services to its original ride-sharing appRod Rosenstein stares blankly into the distance at Mueller report press conference
Attorney general William Barr held a press conference Thursday morning to discuss the long-awaited MGoogle reportedly collecting health data, including lab results, on millions of Americans
In our latest step toward becoming a full dystopian nightmare, the Wall Street Journalreports that GRyan Reynolds' fake Amazon review of his own gin company is as glorious as you'd expect
Even when Ryan Reynolds is blatantly promoting his own stuff, we still can't get mad at him.He justTwitter is developing a new misinfo moderation tool called Birdwatch
The President of the United States is in the hospital with COVID-19 — and no one can seem to aUber's new driver features could mean more destination discrimination
Back before Uber and Lyft ride-sharing (yes, there was a time!), hailing a regular cab didn't alwaysEnd of an era: Jony Ive removed from Apple's leadership page
The fact that legendary Apple designer Jony Ive is leaving the company has been known since June, buSnapchat's new 'time machine' lens is a nightmare look at your future self
Months after FaceApp's viral "old age" filter launched a thousand memes (and misguided rumors of RusDon't freak out about the latest scary screen time study
There's a new study out about child brain development and screen time. So naturally, there is panic.Redacted Mueller report has unleashed a flurry of great redaction memes
At long last, the day has come. A copy of the Mueller report is expected to be released to the generACLU says ICE and CBP searching electronics violates the Constitution
These days "the border" is used more as an inflammatory concept than an actual place with rules and