Webb writes: "I have an awareness of potential vulnerabilities, and I'm trying to develop an evolving set of street smarts. You should, too."
Everything electronic you own - iPhone to subway card to power strip - can be hacked. (photo: Moodboard/Getty Images)
28 November 13
verything electronic you own - iPhone to subway card to power strip - can be hacked. So how to defend yourself?
Wherever you're sitting right now, take a moment to note the connected devices around you. In your pocket or handbag, you probably have an electronic key fob and perhaps a rechargeable subway card embedded with RFID. You likely have a smartphone, which is connected to a Wi-Fi network and also has voice-mail service. You might be wearing a Nike FuelBand, or a Fitbit, or possibly even a new pair of Google Glass. Maybe you can spot a traffic light or an orange highway sign out of your window. A power strip is likely not too far away.
All of these devices share one thing in common: They can be hacked.
As we herald the coming Internet of Things, it's easy to forget that our ever expanding tech playground is mostly unsupervised. There is no playground teacher to blow a whistle when another kid takes control of your Bluetooth headset. There is no Norton antivirus software for your garage door opener.
If you can plug it in or connect it to a network, your device - no matter what it is - can be harnessed by someone else. And that someone doesn't have to be a Chinese superhacker to do some serious damage with it, either on purpose or by accident. It can be your Uncle Roger, who doesn't have his new iPhone figured out and is cluelessly turning your lights on and off via your Belkin WeMo.
I'm a hobbyist. Because I study emerging technlogy and the future of media, I'm often tinkering, breaking things, and putting them back together. Once, I wanted to see if I could break into the protected Wi-Fi network we set up for my daughter at home. Less than an hour later, I'd failed to penetrate her network but managed to shut down the main network for our house. Which I knew, because of my husband's sudden yelling upstairs: "Why is the IRS website redirecting to Sesame Street?!"
Part of what makes new technology so exciting is that, unlike the old days, it works right out of the box. You no longer need to know how to build a computer, connect a modem, run a terminal emulator, and install bulletin board stystem, or BBS, software in order to send a racy message to a co-worker. Now any tech idiot can download Snapchat and accidentally send a racy photo to his sister-in-law. The tech playground is more accessible and, as a result, increasingly problematic.
Just after the annual Black Hat Internet security convention a few months ago in Las Vegas, I asked a group of my friends - a Navy engineer, a professional hacker, and a hobbyist - to help me come up with a quick list of devices that will be vulnerable during the next few years as the Internet of Things becomes widespread. Here's our (incomplete) list. (Entries with a * are those we've tried hacking at home, for fun.):
And we didn't even get into medical devices, which are frighteningly exposed to mischief.