Is the connected house safe? It is legitimate to be concerned about the safety of connected homes, and Reuben Paul, a child only 11 years old, has shown us. There are a few simple steps to follow that will help you secure your Smart Home and your valuable data.
The fragility of Ido revealed by an 11 year old
Reuben Paul, a child of only 11, showed how a teddy bear could be hacked. During an international security conference held in The Hague, he left everyone speechless by accessing Bluetooth devices from people in the room to manipulate his plush Bob, able to access the cloud via WiFi and Bluetooth. Using a Raspberry Pi (a microcomputer known by most geeks) and Python, he found the smartphones having Bluetooth activ in the audience, get phone numbers, connect one of these plush and, taking control of the lights, he sent her a message. He showed the experts how this type of games can be a double-edged sword.
"From planes to cars, smartphones to Smart Home … any thing or toy can be used as a weapon."
#internetoftoys or #internetofthreats? Reuben Paul 11 yrs.) Tells us at #NLcyber how it is. @ncsc_nl pic.twitter.com/hDstEWlOiZ
Joost vander Vleuten (@BruJoost)
May 16, 2017
In some countries, such as Germany, such toys are forbidden. But the point is elsewhere: the experience with the toy is reproducible on a refrigerator, a thermostat or any other device connect. Thanks to Bluetooth or WiFi, any IoT device can be used to access our data. Of course, Reuben Paul is not a child of any kind (he actually created the Cyber Shaolin Association to educate children and adults about safety), but it's worth asking a few questions about the safety of the devices. Smart Home.
Invite Network: a solution to secure your Smart Home
What to do then to avoid the worst? Secure your WiFi network is an important point to ensure the security of your sensitive data. Rely on a router that supports guest networks. In this way, you can create two different WiFi networks to connect your IoT lun devices, and make your payments online and monitor your bank account. You can also use one network for you exclusively and keep the other available for the IoT devices, relatives and friends who will come to visit you, so as not to lose your precious data.
Creating an invited network is a necessary first step to secure your data
Invited networks are networks that, through different SSIDs and access restrictions, allow you to better protect your data by isolating your home network. This type of network actually offers different security settings, so as not to allow clients to access the router and view / access your private devices. In short, they are a first important step to follow in order to sleep quieter, and do not require any effort to install.
To create two networks, you will need a router that supports this feature. They are numerous on the market, but keep in mind that the router offered by the operators does not offer it often. To make sure your router supports this feature, check it on the manufacturer's website or instruction manual.
How to create an invited network
If you have a home router that supports guest networks, follow these steps:
- Type in your web browser the IP address of the router and specify your username / password.
- Find the parameters assigned to the guest network (often referred to as Guest Zone or Multiple SSID).
- Enable it and enter a name (SSID) for the guest network.
- In the security settings, select the guest network, set a security mode and enter the password.
- Save and wait a few minutes for the router to reboot.
Take a look at the networks available: you should see the new network cr. Now, you just need to keep the password of the network you want to keep private for you and share with your guests the one related to the second network, which will also be connected to IoT (Internet of Things) devices which, because of their Vulnerability, can be easier to hack.
In case you have a router that does not support guest networks, you can connect a hotspot or another router to have a second network available. For more security, the best solution would be to create three different networks: one for your private devices (such as PCs and smartphones for example), one for your IoT devices, and one for the guests.
Opinion by Jessica Murgia
The importance of regularly changing passwords for devices and services online is often underestimated
Since the security of your home connects and your data passes through your network, do not underestimate the importance of:
- Change the default password and replace it with another difficult guess (this may seem obvious, but as often with smartphones, there are many who choose passwords such as 1234 or 0000).
- Change your password regularly.
- Change the name of your network (but do not put your name with your date of birth for example).
Also, when talking about IoT, it is important to turn to secure devices (beware of unknown and economical brands) and keep their software up to date.
Do you already use a home invitational network?
. (tagsToTranslate) smart home (t) wifi (t) connected home (t) how to create a network connected (t) guest network (t) guest network and security (t) smart home and privacy (t) guest network