• Guest
HabraHabr
  • Main
  • Users

  • Development
    • Programming
    • Information Security
    • Website development
    • JavaScript
    • Game development
    • Open source
    • Developed for Android
    • Machine learning
    • Abnormal programming
    • Java
    • Python
    • Development of mobile applications
    • Analysis and design of systems
    • .NET
    • Mathematics
    • Algorithms
    • C#
    • System Programming
    • C++
    • C
    • Go
    • PHP
    • Reverse engineering
    • Assembler
    • Development under Linux
    • Big Data
    • Rust
    • Cryptography
    • Entertaining problems
    • Testing of IT systems
    • Testing Web Services
    • HTML
    • Programming microcontrollers
    • API
    • High performance
    • Developed for iOS
    • CSS
    • Industrial Programming
    • Development under Windows
    • Image processing
    • Compilers
    • FPGA
    • Professional literature
    • OpenStreetMap
    • Google Chrome
    • Data Mining
    • PostgreSQL
    • Development of robotics
    • Visualization of data
    • Angular
    • ReactJS
    • Search technologies
    • Debugging
    • Test mobile applications
    • Browsers
    • Designing and refactoring
    • IT Standards
    • Solidity
    • Node.JS
    • Git
    • LaTeX
    • SQL
    • Haskell
    • Unreal Engine
    • Unity3D
    • Development for the Internet of things
    • Functional Programming
    • Amazon Web Services
    • Google Cloud Platform
    • Development under AR and VR
    • Assembly systems
    • Version control systems
    • Kotlin
    • R
    • CAD/CAM
    • Customer Optimization
    • Development of communication systems
    • Microsoft Azure
    • Perfect code
    • Atlassian
    • Visual Studio
    • NoSQL
    • Yii
    • Mono и Moonlight
    • Parallel Programming
    • Asterisk
    • Yandex API
    • WordPress
    • Sports programming
    • Lua
    • Microsoft SQL Server
    • Payment systems
    • TypeScript
    • Scala
    • Google API
    • Development of data transmission systems
    • XML
    • Regular expressions
    • Development under Tizen
    • Swift
    • MySQL
    • Geoinformation services
    • Global Positioning Systems
    • Qt
    • Dart
    • Django
    • Development for Office 365
    • Erlang/OTP
    • GPGPU
    • Eclipse
    • Maps API
    • Testing games
    • Browser Extensions
    • 1C-Bitrix
    • Development under e-commerce
    • Xamarin
    • Xcode
    • Development under Windows Phone
    • Semantics
    • CMS
    • VueJS
    • GitHub
    • Open data
    • Sphinx
    • Ruby on Rails
    • Ruby
    • Symfony
    • Drupal
    • Messaging Systems
    • CTF
    • SaaS / S+S
    • SharePoint
    • jQuery
    • Puppet
    • Firefox
    • Elm
    • MODX
    • Billing systems
    • Graphical shells
    • Kodobred
    • MongoDB
    • SCADA
    • Hadoop
    • Gradle
    • Clojure
    • F#
    • CoffeeScript
    • Matlab
    • Phalcon
    • Development under Sailfish OS
    • Magento
    • Elixir/Phoenix
    • Microsoft Edge
    • Layout of letters
    • Development for OS X
    • Forth
    • Smalltalk
    • Julia
    • Laravel
    • WebGL
    • Meteor.JS
    • Firebird/Interbase
    • SQLite
    • D
    • Mesh-networks
    • I2P
    • Derby.js
    • Emacs
    • Development under Bada
    • Mercurial
    • UML Design
    • Objective C
    • Fortran
    • Cocoa
    • Cobol
    • Apache Flex
    • Action Script
    • Joomla
    • IIS
    • Twitter API
    • Vkontakte API
    • Facebook API
    • Microsoft Access
    • PDF
    • Prolog
    • GTK+
    • LabVIEW
    • Brainfuck
    • Cubrid
    • Canvas
    • Doctrine ORM
    • Google App Engine
    • Twisted
    • XSLT
    • TDD
    • Small Basic
    • Kohana
    • Development for Java ME
    • LiveStreet
    • MooTools
    • Adobe Flash
    • GreaseMonkey
    • INFOLUST
    • Groovy & Grails
    • Lisp
    • Delphi
    • Zend Framework
    • ExtJS / Sencha Library
    • Internet Explorer
    • CodeIgniter
    • Silverlight
    • Google Web Toolkit
    • CakePHP
    • Safari
    • Opera
    • Microformats
    • Ajax
    • VIM
  • Administration
    • System administration
    • IT Infrastructure
    • *nix
    • Network technologies
    • DevOps
    • Server Administration
    • Cloud computing
    • Configuring Linux
    • Wireless technologies
    • Virtualization
    • Hosting
    • Data storage
    • Decentralized networks
    • Database Administration
    • Data Warehousing
    • Communication standards
    • PowerShell
    • Backup
    • Cisco
    • Nginx
    • Antivirus protection
    • DNS
    • Server Optimization
    • Data recovery
    • Apache
    • Spam and antispam
    • Data Compression
    • SAN
    • IPv6
    • Fidonet
    • IPTV
    • Shells
    • Administering domain names
  • Design
    • Interfaces
    • Web design
    • Working with sound
    • Usability
    • Graphic design
    • Design Games
    • Mobile App Design
    • Working with 3D-graphics
    • Typography
    • Working with video
    • Work with vector graphics
    • Accessibility
    • Prototyping
    • CGI (graphics)
    • Computer Animation
    • Working with icons
  • Control
    • Careers in the IT industry
    • Project management
    • Development Management
    • Personnel Management
    • Product Management
    • Start-up development
    • Managing the community
    • Service Desk
    • GTD
    • IT Terminology
    • Agile
    • Business Models
    • Legislation and IT-business
    • Sales management
    • CRM-systems
    • Product localization
    • ECM / EDS
    • Freelance
    • Venture investments
    • ERP-systems
    • Help Desk Software
    • Media management
    • Patenting
    • E-commerce management
    • Creative Commons
  • Marketing
    • Conferences
    • Promotion of games
    • Internet Marketing
    • Search Engine Optimization
    • Web Analytics
    • Monetize Web services
    • Content marketing
    • Monetization of IT systems
    • Monetize mobile apps
    • Mobile App Analytics
    • Growth Hacking
    • Branding
    • Monetize Games
    • Display ads
    • Contextual advertising
    • Increase Conversion Rate
  • Sundry
    • Reading room
    • Educational process in IT
    • Research and forecasts in IT
    • Finance in IT
    • Hakatonas
    • IT emigration
    • Education abroad
    • Lumber room
    • I'm on my way

California prohibits the sale of IoT-devices with simple passwords or without them

 3r361. 3r3-31. California prohibits the sale of IoT-devices with simple passwords or without them  3r361.
 3r361. About why passwords should be difficult, on Habré, we should not speak again. We can only recall the consequences of the weak protection of IoT gadgets that were turned into a virus. Mirai in “zombies”, ready to obey the commands of a remote operator-hacker.
 3r361.
 3r361. After this and many other incidents, device manufacturers continue to neglect cyber defense of gadgets. Yes, the design and UX of many of them are at their best, the functions are good. But the use of most "cloud" gadgets like the game "hack me if you can", where the winner is almost always a cracker.
 3r361. decided to stop the game and oblige device manufacturers to take care of the selection of complex pairs of "login password" to protect the gadgets. All systems that are sold in the state must be modified accordingly by 2020. The law sets out a number of requirements that must be fulfilled by the developers of hardware network solutions, be it a router, a surveillance camera, or a smart refrigerator.
 3r361.
 3r361. The bill passed the approval procedure in August, and last week it was signed by the governor of Jerry Brown.
 3r361.
 3r361. “Weak methods of protecting devices connected to the network expose their users in California to dangers, and also allow hackers to use electronic devices against the owners themselves,” reads one of the state senators who support the law. "The document gives confidence that technologies work for the benefit of California residents, and also that safety will not be considered the least important issue now," he continued.
 3r361.
 3r361. And indeed, as the Internet of things is gradually developing, more and more gadgets are connecting to the network - this is not only cameras, sensors of various kinds, but also microwaves, baby monitors, air conditioners and other equipment. Immediately after connecting all these devices become targets for hackers. Most often, cybercriminals are not interested in single gadgets, but in networks that unite thousands and thousands of such devices. We are talking about botnets, with the help of which hackers can do a lot - from DDoS attacks to hacking attempts to networks of banking and financial organizations.
 3r361.
 3r361. As mentioned above, IoT-gadgets are often deprived of even the weakest protection, which is what hackers use. Thus, even scripts can create a small botnet from hacked devices. The results of all this are visible to the naked eye. Two years ago, under the control of hackers were millions of devices - now, probably, even more such gadgets. And the more manufacturers produce IoT-systems for home and office, the greater the risk of the owners of such systems.
 3r361.
 3r361. Why law 3r3341. sent
on manufacturers of the equipment? The fact is that far from all buyers of the connected devices have the necessary level of technical knowledge in order to protect the purchased device from hacking on their own. Yes, one has only to change the banal “admin /admin” combination to a complex alphanumeric-character password, and in most cases botnets will not be able to subordinate such a device to themselves. But how to change the password, knows a relatively small percentage of users, and those who really change it, even less.
 3r361.
 3r361. Recently, a survey was conducted, the purpose of which is to find out how many users of IoT gadgets tried to protect themselves from hacking by replacing the default admin data. As it turned out, about 82% did not even think about it. As for the default data, passwords are far from always simple, but since the manufacturer himself publishes them in the technical documentation supplied with the devices, it is easy for hackers to find out the access data.
 3r361.
 3r361. New California law now obliges equipment manufacturers to create a unique and reliable login /password combination for each device. Of course, this is not a panacea, but still a definite shift in the issue of strengthening cybersecurity policies by manufacturers of IoT gadgets. Perhaps, looking at changes in state law, manufacturers will not wait for them to be forced to do the same and other states and countries, but will change their cybersecurity policy in the direction of gain in advance.
3r361. 3r361.
! function (e) {function t (t, n) {if (! (n in e)) {for (var r, a = e.document, i = a.scripts, o = i.length; o-- ;) if (-1! == i[o].src.indexOf (t)) {r = i[o]; break} if (! r) {r = a.createElement ("script"), r.type = "text /jаvascript", r.async =! ? r.defer =! ? r.src = t, r.charset = "UTF-8"; var d = function () {var e = a.getElementsByTagName ("script")[0]; e.parentNode.insertBefore (r, e)}; "[object Opera]" == e.opera? a.addEventListener? a.addEventListener ("DOMContentLoaded", d,! 1): e.attachEvent ("onload", d ): d ()}}} t ("//mediator.mail.ru/script/2820404/"""_mediator") () (); 3r3355. 3r361.
3r361. 3r361. 3r361. 3r361.

It may be interesting

  • Comments
  • About article
  • Similar news
This publication has no comments.

weber

Author

7-10-2018, 01:36

Publication Date

Development / Information Security

Category
  • Comments: 0
  • Views: 301
Speed ​​limit for electric cars
Turing game
The duty for goods from foreign online
Webinar “Do you need Kubernetes?”
Until new meetings
Nintendo patents case - Game Boy
Write a comment
Name:*
E-Mail:


Comments
The new version allows users to export visible map elements as JSON, GeoJSON and XML. Like reported in the project blog, users with their own repositories in OpenStreetBrowser Dev can now upload categories from git branches. Wobble Man’s main game mode.
Today, 10:45

loyceasher

kolkata call girl  kolkata call girls  call girls in kolkata  call girl in kolkata  kolkata escort  female escorts in kolkata  escorts in kolkata kolkata escorts services  kolkata escorts service  call girls kolkata  call girl kolkata  college call girls in kolkata  bengali call girls in kolkata  model escorts in kolkata  russian escorts in kolkata  housewife escorts in kolkata
Today, 10:43

thesupriyasingh

Melissa Simon-Hartman is a London born artist, couture fashion, and hand-crafted costume designer. Drawing heavily from her Trinidadian and Ghanaian heritage. Checkout : Celebrity Fashion Designer
Today, 06:45

saifwordpress

Grace and Moore provides stylish African inspired clothing for women. We offer trendy tops, fashion skirts, African jewelry, blouses, dresses, and handbags. Check Out: Trendy Tops


Lisa Zahner, an active investor and a recognized leader in San Francisco’s commercial real estate market, specializes in Multifamily and Investment Real Estate. Check Out: Multifamily Real Estate
Yesterday, 21:25

noorseo

This is a great article thanks for sharing this informative information. I will visit your blog regularly for some latest post. I will visit your blog regularly for Some latest post.สมัคร slot เครดิตฟรี แค่ยืนยันตน

Yesterday, 15:16

raymond weber

Adv
Website for web developers. New scripts, best ideas, programming tips. How to write a script for you here, we have a lot of information about various programming languages. You are a webmaster or a beginner programmer, it does not matter, useful articles will help to make your favorite business faster.

Login

Registration Forgot password