Almost 30 million households in Europe will be smart homes by the end of the year, research suggests. Getty Images
Almost 30 million households in Europe will be smart homes by the end of the year, research suggests. Getty Images
Almost 30 million households in Europe will be smart homes by the end of the year, research suggests. Getty Images
Almost 30 million households in Europe will be smart homes by the end of the year, research suggests. Getty Images

When smart homes aren't smart enough: why your home tech could be easily hacked


  • English
  • Arabic

It's an unsettling experience to have your home invaded by some kind of technological poltergeist. Unusual messages spontaneously emerging from your printer. Disembodied voices coming through your security camera. Thermostats going haywire, odd videos interrupting your evening's television viewing and doors unlocking without warning. While these occurrences are still relatively uncommon, last year saw a marked increase in hackers targeting internet-connected devices in people's homes: from light bulbs to plant waterers, music players to central-heating systems. The consumer appeal of this kind of gadget is obvious: by hooking them up to your network, you can automate them and control them remotely – but with that convenience comes vulnerability.

The problem is on the rise 

In recent months, a number of well-publicised incidents have raised awareness of the problem. In November, a group of hackers in Calgary, Canada, accessed a security camera belonging to a man living 2,500 kilometres away in Arizona and spoke to him through the device to warn him that his home was insecure. One of his personal passwords had leaked on the internet, and he had used the same one for his camera. Last week, someone styling themselves as ­"TheHackerGiraffe" hijacked tens of thousands of printers and Chromecast devices to display messages promoting the videos of Swedish YouTuber PewDiePie.

While these incidents seem to be mischievous rather than malicious, they highlight a more sinister problem, according to John Shier at security software firm Sophos. “Insecure devices can become a gateway into the rest of your network,” he says. “This could dramatically impact your privacy if documents are stolen or your traffic is monitored. But the more likely scenario is one we’ve seen time and time again, where devices are hijacked to become part of a botnet – perhaps a hundred thousand strong – which is then used to attack somebody else.”

Craig Young, a researcher at cybersecurity firm Tripwire, explains that compromised devices can also present a direct risk to personal safety. “If a Chromecast device is improperly exposed to the internet,” he says, “someone could find out its physical location. Then, if they see that no one has watched TV for 24 hours, they might guess that you’re away from home.” With a predicted 20 billion so-called “Internet of Things” (IoT) devices online by 2020, the potential for this kind of crime is growing by the day. “We need to start thinking in terms of herd immunity,” Shier says.

Security can be sacrificed for ease of use

While it’s true that many people take little interest in their own digital security, Young believes that a good deal of the blame can be laid at the doors of certain manufacturers. With the growing trend for devices to work straight out of the box, the industry-wide pursuit of a “frictionless” experience – no menus, no passwords, no hassle – can present problems. “Firms want to encourage adoption of these new technologies,” Young says. “So some of them make devices easier to use by sacrificing certain security components. They promote the idea that anything you put in your home network is safe because it’s only used by people you trust – but that doesn’t meet the reality of the modern internet.” Shier also sees security problems in budget products. “The firms who want to get in on the IoT craze will try to get to market cheaper than everybody else,” he says, “and so corners are cut.”

_________________________

Read more:

As Haley closes Twitter account, are Trump and team headed for social media standoff?

From driverless cars to delivery drones: What will technology do to us in 2019? 

AI-created photos: a threat or opportunity?

_________________________

User-friendly devices that don't require a password to access them present obvious problems, but devices where default factory-­set passwords are never changed by the user are equally unsafe. Such devices have been attacked for years. In 2014, a Russian website began broadcasting streams from unsecured webcams and it became hugely popular – but we still haven't wised up. A 2017 article by security company Positive Technologies estimated that the default passwords of 15 per cent of internet-connected devices have never been changed since they were unboxed. A simple Google search can reveal those default passwords, giving hackers a big head start when looking for vulnerabilities.

Hackers are trying to expose poor security

As hacking methods become more sophisticated, smart devices also need regular firmware updates to stay secure – but the habit of checking for such updates hasn't caught on, according to Young. "I don't know about you," he says, "but I don't think many people are logging in to, say, their router on a regular basis to see if it needs an update. The only way somebody will do that is if they see a news story telling them that it's being exploited." Shier agrees. "It's difficult to incentivise somebody to do something from a security perspective," he says, "but when you see that someone's webcam has been hacked, well, then it becomes real."

TheHackerGiraffe, who perpetrated last week's printer and Chromecast exploit, styles himself as a "white hat" hacker whose exploits are to alert consumers to poor security. "I just wanted to tell people that their devices were vulnerable," he said in an audio post on Twitter. "It doesn't matter how many blog posts security researchers write. No one cared, no one thought about it. But all it took was someone like me. The number of printers exposed went down, people started protecting their stuff. I'm glad." But having received a number of threatening messages in the past few days, he has curtailed his activities and deleted almost all of his online accounts. "I definitely don't support hackers using people's devices [in this way]," Young says, "but I can understand where they're coming from."

The problem evidently can't be solved by public-spirited hacking alone, and Shier believes that governments will soon start to take action. "I think they will provide incentives to companies by drawing up a set of guidelines," he says, "and if a product meets all of them, then they'll have the opportunity to put a gold star on the box [as an assurance of quality], so that it stands out from the others." This would certainly be a step in the right direction, but little progress is being made on agreeing an international set of guidelines for the security of baby monitors, fridges, smart kettles and home hubs. For the time being, it's down to us to recognise that devices that claim to make our lives easier also have the potential to make them much more difficult.

MOUNTAINHEAD REVIEW

Starring: Ramy Youssef, Steve Carell, Jason Schwartzman

Director: Jesse Armstrong

Rating: 3.5/5

Result

Crystal Palace 0 Manchester City 2

Man City: Jesus (39), David Silva (41)

Mrs%20Chatterjee%20Vs%20Norway
%3Cp%3E%3Cstrong%3EDirector%3A%3C%2Fstrong%3E%20Ashima%20Chibber%C2%A0%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3EStars%3A%3C%2Fstrong%3E%20Rani%20Mukerji%2C%20Anirban%20Bhattacharya%20and%20Jim%20Sarbh%C2%A0%3C%2Fp%3E%0A%3Cp%3E%3Cstrong%3ERating%3A%3C%2Fstrong%3E%202%2F5%3C%2Fp%3E%0A
Our family matters legal consultant

Name: Hassan Mohsen Elhais

Position: legal consultant with Al Rowaad Advocates and Legal Consultants.

Paatal Lok season two

Directors: Avinash Arun, Prosit Roy 

Stars: Jaideep Ahlawat, Ishwak Singh, Lc Sekhose, Merenla Imsong

Rating: 4.5/5

BMW M5 specs

Engine: 4.4-litre twin-turbo V-8 petrol enging with additional electric motor

Power: 727hp

Torque: 1,000Nm

Transmission: 8-speed auto

Fuel consumption: 10.6L/100km

On sale: Now

Price: From Dh650,000

Avatar: Fire and Ash

Director: James Cameron

Starring: Sam Worthington, Sigourney Weaver, Zoe Saldana

Rating: 4.5/5

Profile of Foodics

Founders: Ahmad AlZaini and Mosab AlOthmani

Based: Riyadh

Sector: Software

Employees: 150

Amount raised: $8m through seed and Series A - Series B raise ongoing

Funders: Raed Advanced Investment Co, Al-Riyadh Al Walid Investment Co, 500 Falcons, SWM Investment, AlShoaibah SPV, Faith Capital, Technology Investments Co, Savour Holding, Future Resources, Derayah Custody Co.

Know your camel milk:
Flavour: Similar to goat’s milk, although less pungent. Vaguely sweet with a subtle, salty aftertaste.
Texture: Smooth and creamy, with a slightly thinner consistency than cow’s milk.
Use it: In your morning coffee, to add flavour to homemade ice cream and milk-heavy desserts, smoothies, spiced camel-milk hot chocolate.
Goes well with: chocolate and caramel, saffron, cardamom and cloves. Also works well with honey and dates.

CONFIRMED%20LINE-UP
%3Cp%3E%0DElena%20Rybakina%20(Kazakhstan)%20%20%0D%3Cbr%3EOns%20Jabeur%20(Tunisia)%20%20%0D%3Cbr%3EMaria%20Sakkari%20(Greece)%20%20%0D%3Cbr%3EBarbora%20Krej%C4%8D%C3%ADkov%C3%A1%20(Czech%20Republic)%20%20%0D%3Cbr%3EBeatriz%20Haddad%20Maia%20(Brazil)%20%20%0D%3Cbr%3EJe%C4%BCena%20Ostapenko%20(Latvia)%20%20%0D%3Cbr%3ELiudmila%20Samsonova%20%20%0D%3Cbr%3EDaria%20Kasatkina%E2%80%AF%20%0D%3Cbr%3EVeronika%20Kudermetova%E2%80%AF%20%0D%3Cbr%3ECaroline%20Garcia%20(France)%E2%80%AF%20%0D%3Cbr%3EMagda%20Linette%20(Poland)%E2%80%AF%20%0D%3Cbr%3ESorana%20C%C3%AErstea%20(Romania)%E2%80%AF%20%0D%3Cbr%3EAnastasia%20Potapova%E2%80%AF%20%0D%3Cbr%3EAnhelina%20Kalinina%20(Ukraine)%E2%80%AF%E2%80%AF%20%0D%3Cbr%3EJasmine%20Paolini%20(Italy)%E2%80%AF%20%0D%3Cbr%3EEmma%20Navarro%20(USA)%E2%80%AF%20%0D%3Cbr%3ELesia%20Tsurenko%20(Ukraine)%3Cbr%3ENaomi%20Osaka%20(Japan)%20-%20wildcard%3Cbr%3EEmma%20Raducanu%20(Great%20Britain)%20-%20wildcard%3C%2Fp%3E%0A
UAE SQUAD

 Khalid Essa (Al Ain), Ali Khaseif (Al Jazira), Adel Al Hosani (Sharjah), Mahmoud Khamis (Al Nasr), Yousef Jaber (Shabab Al Ahli Dubai), Khalifa Al Hammadi (Jazira), Salem Rashid (Jazira), Shaheen Abdelrahman (Sharjah), Faris Juma (Al Wahda), Mohammed Shaker (Al Ain), Mohammed Barghash (Wahda), Abdulaziz Haikal (Shabab Al Ahli), Ahmed Barman (Al Ain), Khamis Esmail (Wahda), Khaled Bawazir (Sharjah), Majed Surour (Sharjah), Abdullah Ramadan (Jazira), Mohammed Al Attas (Jazira), Fabio De Lima (Al Wasl), Bandar Al Ahbabi (Al Ain), Khalfan Mubarak (Jazira), Habib Fardan (Nasr), Khalil Ibrahim (Wahda), Ali Mabkhout (Jazira), Ali Saleh (Wasl), Caio (Al Ain), Sebastian Tagliabue (Nasr).

8 traditional Jamaican dishes to try at Kingston 21

  1. Trench Town Rock: Jamaican-style curry goat served in a pastry basket with a carrot and potato garnish
  2. Rock Steady Jerk Chicken: chicken marinated for 24 hours and slow-cooked on the grill
  3. Mento Oxtail: flavoured oxtail stewed for five hours with herbs
  4. Ackee and salt fish: the national dish of Jamaica makes for a hearty breakfast
  5. Jamaican porridge: another breakfast favourite, can be made with peanut, cornmeal, banana and plantain
  6. Jamaican beef patty: a pastry with ground beef filling
  7. Hellshire Pon di Beach: Fresh fish with pickles
  8. Out of Many: traditional sweet potato pudding