• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Skip to navigation
Close Ad

The Spoon

Daily news and analysis about the food tech revolution

  • Home
  • Podcasts
  • Events
  • Newsletter
  • Connect
    • Custom Events
    • Slack
    • RSS
    • Send us a Tip
  • Advertise
  • Consulting
  • About
The Spoon
  • Home
  • Podcasts
  • Newsletter
  • Events
  • Advertise
  • About

security

October 17, 2019

SKS 2019: Security in the Connected Kitchen is a Process, Not an Endpoint

You’re only as strong as your weakest point, and this is especially true for cybersecurity, where automated brute force attacks can barrage your network. As more devices in your home get connected to the internet (hello, smart oven!), they represent more opportunities for hackers to gain access to your home network to use your connected devices for botnet attacks or worse.

The growing importance of security is the reason we held the Hacking the Oven, Cybersecurity and the Connected Kitchen panel at our 2019 Smart Kitchen Summit this month. It was led by The Internet of Things Podcast host Stacey Higginbotham and featured Gonda Lamberink, Cybersecurity Senior Business Development Manager at UL, and Steve Nackers, Manager, Electronic Controls at Sub-Zero Group, Inc.

You should watch the full video of the panel below, but for the TL;DR crowd, here are three big takeaways:

Proper security comes from having a corporate culture that values it. Security isn’t something that you just tack onto a product as near its final release. It needs to be baked in as a core component from the very beginning.

Both manufacturers and consumers have a role to play. Manufacturers need to make sure they are building secure devices (no chips directly on boards) and that over-the-air updates are easy to install. Consumers too need to take responsibility for their role in owning a connected device (change those passwords!).

Security is a process, not an endpoint. There is no secure today = secure tomorrow in cybersecurity. Connected kitchen appliance manufacturers need to stay up to date on vulnerabilities and have a plan to address them as they come up.

As the panelists agreed, just as we see an Energy Star rating sticker on appliances that are more electricity efficient today, it won’t be long until we something similar that touts a device’s security. As more consumers become aware of cybersecurity, the more they will demand it.

SKS 2019: Hacking the Oven, Cybersecurity and the Connected Kitchen

October 27, 2016

An Explainer: The Impact of The Mirai Botnet Attack On The Smart Kitchen

Last week, one of the worst fears of Internet of Things (IoT) industry insiders was realized when someone took advantage of security holes in connected devices like netcams and home routers to create a botnet attack on popular websites like Twitter and Soundcloud.

While the attack didn’t involve any connected kitchen devices, as more and more device makers add network connections such as Wi-Fi, the possibility of a similar attack becomes likely.

Because of the complicated nature of malware like Mirai and what happened last week, let’s review exactly what happened and then look at the possibility of it happening in the smart kitchen.

What Happened

-First, the event was the result of a form of malware – essentially a form of computer virus – that runs on devices with an embedded operating system called Linux. Many connected consumer electronics use some form of Linux, which is an open source operating system, including smart kitchen devices.

-This attack was engineered to attack devices that have a network connection and an open IP address on the Internet. It also targeted those devices that still used the factory default password and username (You know the “admin” and “password” login credentials you get when you buy something like a low-cost home router at Best Buy).

-Once a device was infected, it was instructed to send a bunch of requests to connect with popular websites like Twitter. While one device like a network camera doesn’t do much to impact a popular site like Twitter, hundreds of thousands of these devices working together in the form of an IoT “zombie army” can overwhelm even the most popular sites. This type of attack is called a ‘Distributed Denial of Service’ – or DDOS – attack.

What Could Happen Next and What To Do About It

Now, what didn’t happen is what we often fear will take place when we put a connected device in our home: someone overtakes the device and starts to do bad things like make it operate when we don’t want to or makes it malfunction. Not that those things can’t happen – we’ve already had examples of people overtaking connected baby monitors to talk to children.

The reality is that IoT devices are a new playground for folks with malicious intent. The idea of connecting and controlling a small consumer connected device is enticing for hackers, as has been amply illustrated at hacker conventions like DEF CON.

However, it’s fairly straightforward to protect your products by taking a few basic steps that employ best practices. One is to make sure you don’t default to the same username and password in devices coming from your factory. Companies like Securifi, the makers of the Almond consumer router, create randomly generated default passwords that make it much harder for a person with malicious intent to access the device.

Next, use a secure connection to the cloud if your connected device employs any form of Internet service. What you don’t want to do is simply leave it open to be accessed from remote locations on the Internet.

Lastly, you should have both in-house expertise as well as rely on third party experts who know how to create secure consumer devices. Often appliance makers wading into the connected home are new to this world, so just like you wouldn’t enter a foreign market without tapping into local expertise to help you navigate a new marketplace, you don’t want to enter the world of connected devices without knowledgeable people both inside and outside your company walls.

Check out our podcast on the topic with IoT expert Jim Hunter here.

 

October 27, 2016

Podcast: Examining The Impact of The Mirai IoT Botnet Attack on The Smart Kitchen

Last week a botnet attack was carried out using an army of IoT devices. While the vulnerable devices were netcams and home routers, we know that as more kitchen devices add connectivity, they could become unwilling participants in nefarious attacks.

For this podcast we visit with Jim Hunter of the IoT Consortium to talk about the implications of the Mirai attack and how home appliance makers can protect themselves and consumers from future attacks.

Primary Sidebar

Footer

  • About
  • Sponsor the Spoon
  • The Spoon Events
  • Spoon Plus

© 2016–2025 The Spoon. All rights reserved.

  • Facebook
  • Instagram
  • LinkedIn
  • RSS
  • Twitter
  • YouTube
 

Loading Comments...