HOME  |  NEWS  |  BLOGS  |  MESSAGES  |  FEATURES  |  VIDEOS  |  WEBINARS  |  INDUSTRIES  |  FOCUS ON FUNDAMENTALS
  |  REGISTER  |  LOGIN  |  HELP
Page 1/2  >  >>
Cabe Atwell
User Rank
Blogger
Re: Security?
Cabe Atwell   5/4/2014 11:16:58 PM
NO RATINGS
I would say hackers are indeed interested in breaking into smart-homes. Not for monetary or personal gain (unless there was a bad breakup between two parties) but to install fear into those living in it. Just look at what happened to that Family in Colorado who had their baby monitor (outfitted with a camera no less) hijacked. 

William K.
User Rank
Platinum
Re: Security?
William K.   1/29/2014 1:47:19 PM
NO RATINGS
Elizabeth, Now I am wondering about the possibility of an article that examines the means that hackers use to exploit security faults in software, and possibly hardware. The methods that I have used in the distant past were to store the executable code in either proms or E-Proms, or to limit the connection hardware to send only operation. Those worked well, but probably nobody would accept the limitations today. But just consider how very secure an operating system burned into a PROM would be. No way to change anything because writing would not be available. And the memory used to store the configuration parameters could have a removable jumper to allow editing. I have actually used systems like that, and the only damage ever done was bty a sabateur who pulled off the write-inhibit jumpers. But that reqired physically opening the cabinet to do the damage.

Elizabeth M
User Rank
Blogger
Re: Security?
Elizabeth M   1/29/2014 4:26:30 AM
NO RATINGS
Truer words about security were never spoken, William K. And hacking keeps getting more and more sophisticated.

William K.
User Rank
Platinum
Re: Security?
William K.   1/28/2014 4:18:29 PM
NO RATINGS
The challenge in providing adequate security is that it is almost never simple and never ever chaep. In addition it is usually not very convenient. 

Elizabeth M
User Rank
Blogger
Re: Security?
Elizabeth M   1/28/2014 11:20:32 AM
NO RATINGS
Hmm, you are probably right about this, too, William K. Some curious hackers might just break into the system just to spy on people, just because they can. It also could be used by potential thieves who might want to break into the home, so use the information to find out when people are at home or not at home. At any rate, all of this means security is definitely an issue that must be addressed.

William K.
User Rank
Platinum
Re: Security?
William K.   1/27/2014 3:34:56 PM
NO RATINGS
It just occurred to me that it may be an interesting thing for hackers to tap into whatever indoor security cameras may be installed. That would be a serious breach of privacy that might freakout  a lot of folks. And security cameras for checking on pets and kids have been one of the touted possibilities for several years. "use your phone to check on the kids, the sitter, or the pets" is a line that I know I have seen. And that would be one of the systems that I would anticipate being the most desirable to have. And likewise the system to just listen to the house to check on it. So it is likely that snoopers might find hacking in to be very entertaining.

Elizabeth M
User Rank
Blogger
Re: Security?
Elizabeth M   1/27/2014 10:05:05 AM
NO RATINGS
Yes, you are probably right, William K. I guess just because I can´t see the point of messing with someone´s lights just for fun doesn´t mean there are a lot of hackers who wouldn´t like to do such a thing. I can completely see your point.

William K.
User Rank
Platinum
Re: Security?
William K.   1/27/2014 9:58:51 AM
NO RATINGS
Elizabeth, I think that a lot of hackers just do it for the challenge, or to make some organization look bad. Why do you think that so many things attack Microsoft products? That company has thousands of enemies.

And I can immagine that some hackers may just want to see how many houses they can get the lights flashing off and on at. The more sinister hackers may attempt to bring down the electrical grid by cycling all of the high power appliances on and off. Just picture a whole neighborhood's central AC units switching on at the same time. And there are secondary methods to disable a security system such as changing the arrivalhome time setting, which may automatically switch off the alarms, Or ask the system to open the garage door. 

The point about the lack of any Google security is certainly valid, almost weekly I get emails from hacked Google/facebook acounts, so it seems that none of that area has been secured.

So really, the downsides of those unintended consequences far outweigh any percieved benefits, as I see it.

Elizabeth M
User Rank
Blogger
Re: Security?
Elizabeth M   1/27/2014 9:45:13 AM
NO RATINGS
Good point, AnandY, this is an issue that needs to be addressed. Although I have to say, I am not sure hackers would be so interested in infiltrating someone´s home just to mess with their lights! But it could definitely be a threat to in-home security systems also controlled by such an Android-powered system, so definitely a big concern.

Elizabeth M
User Rank
Blogger
Re: Just use the phone
Elizabeth M   1/27/2014 9:31:20 AM
NO RATINGS
Thanks for the feedback, William K and Lou. I would tend to agree with you guys that the mobile and wireless way to control the home is the best way to go but I think it´s still worthwhile and interesting to see the different approaches to this. Don´t you agree: bRight switch is just one option out of many that are cropping up.

Page 1/2  >  >>


Partner Zone
Latest Analysis
Hacking has a long history in the movies, beginning with Tron and War Games and continuing through The Girl with the Dragon Tattoo.
In a move that strengthens its 3D design business, Stratasys continued a 15-month buying spree this week by announcing its plan to acquire GrabCAD, a provider of a cloud-based collaboration environment for engineers.
Feature-advantage-benefit could help engineers in how we approach design problems, how we sell our ideas to management, and how we market ourselves when it comes to jobs.
Many diverse markets take advantage of semiconductor IP; so many that no one can recite the entire list without leaving off several. So why do we track all the vertical markets? They all have a unique set of requirements and value attributes differently. One major vertical market segment is automotive.
Adam Berger hacked a computer keyboard into a mini key-tar to play with his band.
More:Blogs|News
Design News Webinar Series
9/10/2014 11:00 a.m. California / 2:00 p.m. New York
7/23/2014 11:00 a.m. California / 2:00 p.m. New York
7/17/2014 11:00 a.m. California / 2:00 p.m. New York
6/25/2014 11:00 a.m. California / 2:00 p.m. New York
Quick Poll
The Continuing Education Center offers engineers an entirely new way to get the education they need to formulate next-generation solutions.
Sep 22 - 26, MCU Software Development A Step-by-Step Guide (Using a Real Eval Board)
SEMESTERS: 1  |  2  |  3  |  4  |  5  |  6


Focus on Fundamentals consists of 45-minute on-line classes that cover a host of technologies. You learn without leaving the comfort of your desk. All classes are taught by subject-matter experts and all are archived. So if you can't attend live, attend at your convenience.
Next Class: September 30 - October 2
Sponsored by Altera
Learn More   |   Login   |   Archived Classes
Twitter Feed
Design News Twitter Feed
Like Us on Facebook

Sponsored Content

Technology Marketplace

Copyright © 2014 UBM Canon, A UBM company, All rights reserved. Privacy Policy | Terms of Service