LED light bulbs that support wireless networking are invaded

The ContextInformationSecurity release statement warns all IoT-related companies that there is a security risk associated with wirelessly-connected LED bulbs produced by LIFX. Obviously, in this wave of Internet of Things, these devices that require network connections do not reach their priority in terms of security requirements. Context research director Michael Jordon said. We also find many security vulnerabilities on other devices such as home storage devices, printers, and baby monitors. The IoT security standards need to be taken seriously, especially before these companies are ready to connect important devices and systems to the network. Jordon added. These LED bulbs, produced by the startup technology company LIFX, use the 802.15.46LoWPAN network, allowing the bulbs to be remotely connected via the mobile app connection when Wi-Fi is connected. As long as you listen to network packets, you can discover encrypted network settings messages from these lights. Basically, to understand the encryption method used, Context must connect two micro-control system units (TI and STM, both Cortex-M3) to the JTAG test connection. Once connected, you can read it. Take encryption algorithms, keys, and wireless mesh protocols. This information will allow companies or businesses to place network packets and these actions will not be detected. Context subsequently released a firmware update in cooperation with LIFX. This vulnerability has been fixed. Now all 6LoWPAN networks need to use the encryption key imported from the Wi-Fi certification authority, and LIFX's newly produced light bulb has also been added to this security mechanism. Invading a light bulb is not a trivial matter of sesame mung beans, but may cause cybercrime. Jordon shows that in some cases, these weaknesses can be easily reinstated, as demonstrated by LIFX developers. In other cases, these security vulnerabilities may exist in the foundation of product design. The most important thing is that these security measures must be built in all IoT devices from the beginning. Although there are many Internet of Things companies that seem to have such problems, they can be used when security issues are discovered. The premise of damage is repaired early. Jordon stressed.

Brush Type Auto Car Wash Machine

Brush Type Auto Car Wash Machine,Auto Car Washer,Speedway Touchless Car Wash,Brushless Touchless Car Wash

Zhengzhou Shinewash Technology Co.,Ltd , https://www.nbshinewashtech.com

Posted on