21.4 C
New York
Sunday, April 18, 2021

Latest Posts

Zynga: Game company under attack with 170 million accounts affected

The "Have I been Pwned" site records and publishes reports from websites or companies that have...

Free Fire surprises everyone and everything by being considered the best mobile game of 2020!

We haven't heard of Battle Royale, Free Fire for a long time, which remains extremely popular...

HP’s new DreamColor monitors are worth knowing

HP Z25xs G3 and Z27xs G3 DreamColor When looking for a new monitor for the desktop, laptop or even to use it together with the...

Xiaomi presents the new range of smartphones Redmi K40

Xiaomi today presented (25) three new Android smartphones, the Redmi K40, K40 Pro + it's the...

Ransomware of Things: the main risks and method of attack

The immense connectivity in which we live, despite bringing many advantages, also carries some associated risks. They are convenient solutions that materialize in the communication between several devices and in the Internet connection of several products.

The alert is given by Check Point, an entity specialized in cybersecurity solutions worldwide, which warns especially for the Ransomware of Things. Something that can affect even home appliances with a web connection, and various gadgets.

The danger posed by the Ransomware of Things

Ransomware of things

It’s an evolution of malicious software that, instead of stealing sensitive information from a particular company, takes control of all devices connected to the internet. Thus, preventing the user from using them until payment of a ransom.

Although it is already well known, ransomware remains a current threat. According to Check Point, this type of cyber attack grew 160% in the third quarter of last year.

This means that, on average, 8% of businesses suffer an attack every week. It is therefore understandable why the Cyber ​​Security Report 2020 indicates targeted ransomware as one of the biggest threats identified.

“While information remains the primary focus of cyber attackers as a means of obtaining a rescue, it is increasingly common for these attacks to focus on all types of devices, not just computers. With this, the threat is amplified, since the risk stops targeting only companies, reaching the whole society ”, says Mario García, General Director of Check Point Spain and UK.

How does RoT work? The main danger is Jackware

Internet of Things devices have been gradually entering our reality.

However, there is a long way to go in order to ensure that technological advances are accompanied by appropriate cybersecurity measures.

Attacks that target IoT devices take place in a manner similar to traditional threats, with the main difference that their focus is on blocking devices rather than data.

As a rule, a virus called “jackware” is used. This is malicious software that tries to take control of devices connected to the internet whose function is not to process data.

This means that, for example, in a domestic environment, a cybercriminal could manipulate all types of connected appliances. In fact, in more advanced cases, essential resources such as electricity, water or home control of the residence.

The risks increase when considering, for example, the advances that the road industry has achieved. More specifically, with regard to the number of cars connected to the Internet globally.

It is estimated that, in 2023, the market for advanced driver assistance systems (ADAS) will grow by around 32 billion euros. More and more the functionalities of a car can be controlled via mobile application, such as opening and closing the vehicle or starting the engine.

In this case, taking control of a smartphone, an attacker could therefore control the victim’s car.

“The new generations of cyber threats are notable for being very sophisticated, but also for using old resources, such as ransomware, in an innovative way to bypass traditional security measures. Ransomware of Things is a clear example: cyber-attackers, taking advantage of the fact that connectivity is the engine of the world, direct their attacks on poorly protected mobile devices. As technology is advancing at a rapid pace, it is essential to adopt security measures focused on preventing risks and threats before they materialize. There are no second chances in cybersecurity. It is very important that we are protected from the first moment with the most advanced technological solutions, ”concludes Garcia.

4gnews editors recommend:

*The article has been translated based on the content of https://4gnews.pt/ransomware-of-things-os-principais-riscos-e-metodo-de-ataque/ by 4gnews.pt
. If there is any problem regarding the content, copyright, please leave a report below the article. We will try to process as quickly as possible to protect the rights of the author. Thank you very much!

*We just want readers to access information more quickly and easily with other multilingual content, instead of information only available in a certain language.

*We always respect the copyright of the content of the author and always include the original link of the source article. If the author disagrees, just leave the report below the article, the article will be edited or deleted at the request of the author. Thanks very much! Best regards!

Latest Posts

Check the air quality with these CO2 meters

What is a CO2 meter for? CO2 meters are small devices that have a series of sensors that are capable of analyze air quality of...

Fitbit will launch the smartband that can dethrone the Xiaomi Mi Band 6

The Xiaomi Mi Band 6 was launched at the end of March, and is preparing to...

Android 12 will receive very popular functionality on Windows

After analyzing the source code of a beta version of Android 12, the folks at XDA...

5 great Amazon deals to cheer you up on Saturday

JBL Free X If you are looking for wireless headphones and you would like them to be from a familiar and well-known brand, you should...

Don't Miss

Samsung Galaxy S21 with Exynos processor will be the most powerful in 2021

This year, there was a huge controversy surrounding the Samsung Galaxy S20 and its processors. ...

Apple Patents Way to Increase the Strength of a Folding Screen

The era of folding smartphones has arrived and companies are increasingly interested in investing in this...

Xiaomi Mi 10 Lite 5G, a mobile with brutal design and great autonomy

Xiaomi is always trying to achieve excellence in the value for money of its phones. Xiaomi phones that did not exceed 300 are...

Redmi K30: Xiaomi "hid" that your screen arrives with two holes and not just one!

The Xiaomi subsidiary recently unveiled its latest smartphone of 2019, the Redmi K30. Over the weeks...

Redmi Note 10 with OLED or 120Hz LCD? Xiaomi fans have no doubts

The presentation is scheduled for next March. The chosen country is India. First, the...
%d bloggers like this: