(security)

No Gravatar

To insure that only those that had the right to be in our R&D facilities, we used electronic keys- 30+ years ago.  Moreover, the codes changed, based upon the hour of the day.  That way those who should not have been in the lab after hours couldn’t be.  That was one way we kept our technology to ourselves.  Of course, back then there were no USB keys that you could plug into a computer and walk away with secrets.  But, you could make a floppy.  Somehow, we managed to keep our data smaller back then, too- so a lot could disappear on that floppy (or two or three).

Nowadays, many of us have our keys and security systems hooked into the internet. Which means a computer nerd can probably break in.  Moreover, that nerd (or two) can probably turn on our computers and obtain all sorts of information. (What?  You haven’t deactivated the ‘turn on LAN component?)   Or, maybe you saved your passwords on your smartphone? (Making it a heck of a lot smarter than you!)

hacking in a suite at clarion
hacking in a suite at clarion (Photo credit: Johan Nilsson)

This is the problem with all the “smart” devices we want. They are hackable.  And, their security is lower- much lower- than that which we demand from our own computers.

It reminds me of a funny story- which isn’t so funny in retrospect.  I had a brand new Chrysler New Yorker; my wife, at the time, had a three year old Dodge Grand Voyager.  And, one morning, I was in a rush for a meeting and grabbed the keys by the kitchen phone (that’s where we kept them, for ready access) to get to work.  When I got to the office, I couldn’t open the door.  Because I had grabbed my wife’s keys- and those keys started my car.

That’s guaranteed to happen with these new electronic devices we are buying.  Unless we program them (or demand the manufacturers program them) significantly differently.  After all, most homeowners employ no security on their WiFi networks. (Or, if they do, they use ridiculously facile systems.)  And, these devices are providing the “security” for your home devices.

 

 

One such home security device actually was sold and delivered without any password protection. (Insteon has since developed a basic password function- the key word is BASIC.)  Samsung’s televisions have been hacked to provide views of those watching those same TVs to remote users- while they are watching a program- or even if the TV is ostensibly turned off.  (Talk about casing the joint!)

So, wear clothes when you watch your smart TV.  And, don’t connect your doors or alarm system to the internet.

Enhanced by ZemantaGrow My Biz!
Share this:
Share this page via Email Share this page via Stumble Upon Share this page via Digg this Share this page via Facebook Share this page via Twitter
Share

16 thoughts on “(security)”

  1. One of the biggest concerns as NZ passes a law that partner us with the spy averse American laws today is that the more we trust electronics, the more we leave ourselves vulnerable. And then we get more overwhelmed and complain even more

    1. I don’t hate it, Marie- I use them all fairly extensively. I do try to conceive ways which leave me vulnerable and avoid them like the plague, though…
      (I certainly love the electronic keys…I just don’t share mine over the web…)

    1. Another use for Duct Tape, Alessa!
      thanks for sharing that one…
      By the way- turn off your GPS EVERY TIME you take a picture, to insure that the location of the photo is not transmitted to another soul! (Your house, your school, your vacation spot are all shared with the world if you don’t do that!)
      [I keep the GPS off on my phone 99.9999% of the time. Only when I need to record the location of where I park (and going away for more than a day) do I use the GPS functionality.]

  2. It is scary, isn’t it? I had a similar pb with a box my company was renting out. Basically, a client was able to open someone else’s box with his key…I was ballistic…

  3. very nice article……….. now a days theft of data or project part from labs , research centers, its strong need to install system which are very hard to crack

    1. Why, thank you!
      And, yes, we seem to forget that one of the biggest security issues we have are our own employees. That happens not necessarily because they plan to appropriate those discoveries for their use, but that they leave their computers insecurely protected, let eMail invaders into our networks, etc.

Comments are closed.