A Brief Guide to Preventing IoT Device Security Risks

A Brief Guide to Preventing IoT Device Security Risks

Are my elderly parents safe at home?

Is the nanny attentive when taking care of the child?

How is my pet doing?

Has a thief entered the house?

Install a camera at home and an app on your phone.

In modern life, the use of smart cameras is becoming more and more widespread.

……

However, everything has two sides.

You will never know how many cameras are hidden in hotels, guesthouses, fitting rooms, beauty salons, or even toilets!

A Brief Guide to Preventing IoT Device Security Risks

As the Internet of Things continues to grow, the potential for pathological and illegal privacy invasions is also increasing.

Current Status and Prevention of IoT Security Threats

A Brief Guide to Preventing IoT Device Security Risks

According to a survey by the HP Security Research Institute on the 10 most popular IoT smart devices, almost all devices have high-risk vulnerabilities, with five major security risks, including:

80% of IoT devices have privacy leakage or abuse risks;

80% of IoT devices allow the use of weak passwords;

70% of IoT devices communicate with the internet or local area network without encryption;

60% of IoT devices have security vulnerabilities in their web interfaces;

60% of IoT devices do not use encryption when downloading software updates;

So how can we prevent these security threats and avoid being secretly filmed in daily life?

A Brief Guide to Preventing IoT Device Security Risks

1. How to prevent home cameras from being hacked?

In response to this situation, the intelligence department suggests that everyone should do the following when using IoT devices:

1) Avoid choosing unknown brands or counterfeit brands;

2) Devices must change the original default password and use a strong password, and update it regularly;

3) Do not use the same password as your bank card, email, social software, etc., to avoid expanding the associated losses;

4) Cameras should not face bedrooms, bathrooms, and other private areas; pay attention to check for any changes in angles;

5) Avoid logging in and using in public places or insecure Wi-Fi networks;

6) Regularly check for vulnerabilities and updates of IoT devices.

A Brief Guide to Preventing IoT Device Security Risks

2. What places should you be cautious of when staying in a hotel?

When you enter a room, turn off the lights and then open your phone’s camera function to scan the room. If a pinhole camera is equipped with infrared sensing, your phone will show a red dot. Focus on checking air conditioning, lampshades, ceilings, makeup mirrors, smoke detectors, vases, sockets, TV stands, bedside lamps, vases, air fresheners, wall paintings, etc. Because hidden devices may use wired power supply to continuously film, you should check for any power lines in the room. Pay special attention to these corners.

Professor Peng, a distinguished professor at the School of Optoelectronic Information Science and Engineering at Suzhou University, explained that if the camera has an infrared device or if there are infrared fill lights around the monitoring area, then the camera function of your phone can completely sense the infrared light.

Some hidden devices do not have infrared sensing equipment, so to completely eliminate the possibility of being secretly filmed, carefully check devices facing the bed after checking in. Lower the light in the room, as non-infrared pinhole cameras cannot capture clear images.

Lens detection: Use a high-frequency LED light to scan the area with visible light, and observe whether there are red dots or strong reflections in that area. If found, it can be concluded that there are hidden cameras in that area.

A Brief Guide to Preventing IoT Device Security Risks
A Brief Guide to Preventing IoT Device Security Risks

(The above images and text sections are reproduced from Baidu, National Cyber Security Awareness Week, and other media. If there is any infringement, please contact for deletion.)

E N D

Editor: UPC General Affairs Department Intelligence Section

Leave a Comment

×