A recent discovery has found that NEST CCTV cameras can be wirelessly hacked to crash and stop recording footage via bluetooth making them and the houses they protect perfect targets for criminals. Cesare Garlati, Chief Security Strategist at prpl Foundation commented below.
Cesare Garlati, Chief Security Strategist at prpl Foundation:
“This is yet another case where security by separation at the hardware layer of the device would keep malicious actors from configuring the cameras for their own gain. Without it, lateral movement inside the device is possible because there is no trust established within the device to distinguish which elements have the trusted ability to control critical functions, like turning the device off – it is essentially a free for all if you know where to look. And clearly these guys do. This is a major problem plaguing IoT and should be a wake- up call to device manufacturers to take the security of hardware in connected devices more seriously. In fact, hardware is the key to making security more robust in connected devices. It also further confirms that security through obscurity just doesn’t work anymore and it’s time for a more proactive approach to securing embedded devices including using open source, security through separation with hardware virtualisation and a root of trust established at the hardware level.”
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.