Stuff

    Subscribe to our newsletter

    What's Hot
    features

    HUAWEI to launch a new lineup of products at Xperience HUAWEI 2022

    August 16, 2022
    space farming water

    Farmers can save water with wireless technologies, but there are challenges – like transmitting data through mud

    August 16, 2022
    petrol prices

    Mid-month CEF indicators suggest South Africa’s September petrol price headed to saner levels

    August 15, 2022
    Facebook Twitter Instagram YouTube SoundCloud
    Trending
    • HUAWEI to launch a new lineup of products at Xperience HUAWEI 2022
    • Farmers can save water with wireless technologies, but there are challenges – like transmitting data through mud
    • Mid-month CEF indicators suggest South Africa’s September petrol price headed to saner levels
    • Xiaomi hopes to challenge Tesla by releasing a fully self-driving EV
    • Light Start: Fuel cell BMWs, iPhone ads, LG’s 20in OLEDs, and Hogwarts Legacy’s delay
    • Behold, the Taycan-compatible TAG Heuer Connected Calibre E4 Porsche Edition
    • WhatsApp to bring customised avatars to the platform. Eventually. For metaverse reasons
    • Polaris Dawn, the very first commercial spacewalk, could take place this December
    Facebook Twitter Instagram YouTube
    StuffStuff
    • News
      • App News
      • Business News
      • Camera News
      • Gaming News
      • Headphone News
      • Industry News
      • Internet News
      • Laptops News
      • Motoring News
      • Other Tech News
      • Phone News
      • Tablet News
      • Technology News
      • TV News
      • Wearables News
    • Reviews
      • Camera Reviews
      • Car Reviews
      • Featured Reviews
      • Game Reviews
      • Headphone Reviews
      • Laptop Reviews
      • Other Tech Reviews
      • Phone Reviews
      • Tablet Reviews
      • Wearables Reviews
    • Columns
    • Stuff Guides
    • Podcasts & Videos
      • Videos
      • Stuffed
      • Stuffing Around
      • Tech Byte
      • T2S2
    • Win
    • Subscribe
      • Print
      • Digital
        • Google Play
        • iTunes
        • Download
        • Zinio
    • Stuff Shop
      • Shop Now
      • My Account
      • Downloads
    • Contact Us
      • Get In Touch
      • Advertise
    0 Shopping Cart
    Stuff
    Home » News » Internet News » How everyday devices make you vulnerable to cyber attack – and what to do about it
    Internet News

    How everyday devices make you vulnerable to cyber attack – and what to do about it

    The ConversationBy The ConversationJuly 4, 2018Updated:October 1, 2021No Comments5 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email

    If you run a business, you’re probably concerned about IT security. Maybe you invest in antivirus software, firewalls and regular system updates.

    Unfortunately, these measures might not protect you from malicious attacks that enter your systems through everyday devices.

    On the evening of Friday the 24th of October 2008 Richard C. Schaeffer Jr, the NSA’s top computer systems protection officer was in a briefing with US President George W. Bush when an aide passed him a note. The note was brief and to the point. They had been hacked.

    How did it happen? The culprit was a simple USB.

    USB supply chain attacks

    The attack was unexpected because classified military systems are not connected to outside networks. The source was isolated to a worm loaded onto a USB key that had been carefully set up and left in large numbers to be purchased from a local internet kiosk.

    This is an example of a supply chain attack, which focuses on the least secure elements in an organisation’s supply chain.

    The US military immediately moved to ban USB drives in the field. Some years later, the US would use the same tactic to breach and disrupt Iran’s nuclear weapons program in an attack that has now been dubbed Stuxnet.

    The Bushehr nuclear power plant in Iran is thought to have been infected with a malicious computer worm known as Stuxnet in 2010. ABEDIN TAHERKENAREH/AAP

    The lesson is clear: if you are plugging USB drives into your systems, you need to be very sure where they came from and what’s on them.

    If a supplier can get a secret payload onto a USB stick, then there is no safe period in which a USB is a good choice. For example, you can currently buy a USB stick that is secretly a small computer, and it will, on insertion, open up a window on your machine and play the Death Star march.

    This is just one kind of supply chain attack. What are the other kinds?

    Network supply chain attacks

    Computer users have an increasing tendency to store all their information on a network, concentrating their assets in one place. In this scenario, if one computer is compromised then the entire system is open to an attacker.

    Consider a conference phone used in your organisation. Suppose this network-enabled phone had a built in fault that would allow attackers to listen in on any conversations in the vicinity. This was the reality in 2012 when more than 16 versions of Cisco’s popular IP phone were affected. Cisco released a patch for their phones, which could be installed by most companies’ IT security departments.

    The basic model of a network supply chain attack shows how vulnerable interconnected systems are within an organisation. Author Supplied

    In 2017, a similar issue arose when a brand of hospital grade dishwasher was affected by a built-in insecure web server. In the case of a hospital, there is a great deal of private data and specialist equipment that could be compromised by such a vulnerability. While a patch was eventually released, it required a specialised service technician to upload it.

    Supply chain attacks have recently been implicated in the disastrous failure rate of the North Korean missile program. David Kennedy, in a video for The Insider, discusses how the US has previously disrupted nuclear programs using cyber. If they still possess this capability, it’s possible they would wish to keep it covert. Should this be the case, it’s conceivable one of the numerous North Korean failures could have been a test of such a cyber weapon.

    Five ways companies can protect themselves

    To protect yourself against all of this you need to set up basic cyber hygiene processes that can help keep your business free from infection.

    1. Purchase and install good anti-virus software and run it in protective mode, where it scans everything on your machine. Yes, even Macs get viruses
    2. monitor who is on your network, avoid using untrusted devices such as USBs and have your administrators block autorun as a system-wide policy
    3. segregate your networks. Have critical plant infrastructure? Don’t have it on the same network as your day to day, public-facing or guest access networks
    4. update regularly. Don’t worry about the latest and greatest issues, patch the known vulnerabilities in your systems – especially that one from 1980
    5. pay for your software and labour. If you’re not paying for the product, then someone is paying for you as the product.

    By separating your critical infrastructure from the internet facing and supplier available networks it is possible to provide a level of protection. However, some attacks are able to bridge this ‘air gap’. Author Provided

    Cyber awareness is crucial

    Finally, you can maximise cyber resilience by training everyone in your organisation to learn new skills. But it’s vital to test whether your training is working. Use actual exercises – in conjunction with security professionals – to examine your organisation, practice those skills, and work out where you need to make improvements.

    The price of any connection to the internet is that it’s vulnerable to attack. But as we’ve shown, not even standalone systems are safe. Deliberate practice and thoughtful approaches to security can increase the protection of your business or workplace.

    • Richard Matthews is a PhD Candidate, University of Adelaide
    • Nick Falkner is Associate Professor and Director of the Australian Smart Cities Consortium, University of Adelaide
    • This article first appeared on The Conversation

    cyber-attack hack hacking IT security The Conversation
    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Tumblr Email
    The Conversation

    Related Posts

    features

    HUAWEI to launch a new lineup of products at Xperience HUAWEI 2022

    August 16, 2022
    space farming water

    Farmers can save water with wireless technologies, but there are challenges – like transmitting data through mud

    August 16, 2022
    petrol prices

    Mid-month CEF indicators suggest South Africa’s September petrol price headed to saner levels

    August 15, 2022

    Leave A Reply Cancel Reply

    In The Mag
    Stuff August-September 2022 Latest Issue

    In This Issue – The Women in Tech (August-September 2022) Issue

    By Brett VenterAugust 1, 20220

    August is a pretty special month. It’s the host of International Women’s Day and is…

    2021 Wish List
    wish list Stuff Wish List 2021

    Stuff Wish List: for the tech impaired

    By Duncan PikeDecember 22, 20210

    Are you from the time before being glued to a smartphone was considered normal? Here’s…

    Wishlist DIY Stuff tech

    Stuff Wish List: for the DIY Diehard

    December 21, 2021
    Wish List Gearhead

    Stuff Wish List: For the petrol-soaked gearhead

    December 20, 2021
    outsiders

    Stuff Wish List: for the Outsiders

    December 17, 2021

    Latest Video

    Sonos

    SONOS Roam SL unboxing by Toby Shapshak

    Mini Cooper

    The Mini Cooper SE Electric with Toby Shapshak

    MSI Crosshair 15 Rainbox Six Extraction Edition unboxing

    MSI Crosshair 15 Rainbox Six Extraction Edition unboxing

    Samsung Galaxy S22 Ultra Unboxing

    Samsung Galaxy S22 Ultra unboxing with Toby Shapshak

    Contact

    South Africa's Consumer Tech News Hub

    General: stuff@stuff.co.za
    Subscriptions: stuff@onthedot.co.za or 087 353 1291
    Editorial: 072 735 2614
    Sales: 083 375 2418

    Facebook Twitter Instagram YouTube SoundCloud

    Subscribe to Updates

    • Terms and Conditions
    • Privacy & POPI
    • My account
    © 2022 Stuff Group. Designed by Chronon.

    Type above and press Enter to search. Press Esc to cancel.