Hackers Seek New, Unique Ways to Steal Information

By Tracey E. Schelmetic November 26, 2012

If you don’t use a computer or a smartphone, you’re at no risk for attack by malicious hackers, right?

Wrong. Just because it doesn’t look like a computer doesn’t mean it is a computer, and the interconnectedness of all devices today means that our worlds are becoming far more computerized than ever before, even if it’s not obvious.



Image via Shutterstock

Imagine the average hacker becoming bored with trying to climb inside CIA or banking networks and suddenly turning to other targets: the electronics handling car engines, brakes and door locks; the routers that form the Internet's backbone; the machines running power plants, rail lines and prison cell doors; and even implantable medical devices such as defibrillators and insulin pumps.

Imagine an organized crime group being able to eliminate police officers, judges or prosecutors by simply being able to hack into those individuals’ cars’ computers and causing the brakes to fail. Scary stuff, huh? It sounds like the basis for a science fiction movie, yet it’s a reality today.

A little close to home, imagine how easy it would be for a rival company to hack into one of your company’s printers. In 2011, two computer scientists from Columbia University demonstrated an easy way to hack into HP printers in such a way that they could view everything that was printed, and then easily view anything on any computer connected to that printer. (HP has fixed that bug.)

But many more remain, and it has been reported that many computers and peripherals in sensitive government agencies have no protection on them past their factory defaults.

The U.S. government is not unaware of the scary potential. In October, Secretary of Defense Leon Panetta warned that the U.S. faced the threat of a "cyber Pearl Harbor" if it failed to adequately protect these systems. His comments echoed a warning CIA Director John Deutsch gave to Congress in 1996, according to a recent article in Scientific American

To help address the problem, computer scientists today are building guardians called “symbiotes” designed to run on embedded computers regardless of the underlying operating systems. In doing so, they may not only help protect the critical infrastructure of nations and corporations, but reveal that warfare against these devices may have been going on unseen for years, researchers say.

While the work has been called “very promising,” it’s likely that somewhere, a malicious hacker is already working on a way to get around them.




Edited by Brooke Neuman

TechZone360 Contributor

SHARE THIS ARTICLE
Related Articles

Apple Needs Reset, Not Elon Musk

By: Doug Mohney    4/29/2016

Apple's 13 percent sales decline and subsequent stock price drop this week has lead to the usual crazy talk about how to "fix" the company. Vivek Wadh…

Read More

Is the Apple Bubble Finally Bursting?

By: Andrew Bindelglass    4/28/2016

Over the past 13 years, Apple has been one of the most successful companies in the world of tech, posting sales growths in 51 straight quarters. That …

Read More

Shared-Space Providers (Airbnb) Poised to Beat Ride-Sharers (Uber)

By: Steve Anderson    4/28/2016

Travel may be starting to make a bit of a comeback, as a new report suggests that shared-space providers like Airbnb and WeWork are on the rise.

Read More

Facebook Wants More Sharing, Building New Camera App to Drive It

By: Steve Anderson    4/28/2016

One of the great downsides to having a lot of content in any one place is that, after a while, it starts looking downright pointless to add more.

Read More

Comcast Targets DreamWorks Animation for Acquisition in Multi-Billion Dollar Deal

By: Steve Anderson    4/27/2016

A new and unsettling movement is taking place in the content markets, and it's focused around one of America's most hated companies: Comcast.

Read More