Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 2 April, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

CIA’s Weeping Angel provides a stark warning to device manufacturers on IoT security

by The Gurus
March 9, 2017
in Editor's News
Share on FacebookShare on Twitter

The latest tranche of confidential documents released by WikiLeaks has demonstrated that the CIA and MI5 have developed techniques which enable them to use Internet of Things-connected devices, such as smart televisions, for surveillance purposes. This should serve as the starkest reminder yet to device manufacturers and their users that alarming security holes remain, which could have dire consequences if these techniques fall into the wrong hands. This is according to app security specialist Promon.

According to the released data, the CIA has developed a programme known as Weeping Angel, which can attack a Samsung television set so that it appears to be switched off, but can still monitor and record conversations.

Although the CIA has claimed that this would be used largely as part of counterterrorism procedures, the revelation is a concerning indicator of what could be done by those with more sinister motives.

Tom Lysemose Hansen, founder and CTO at Promon, said: “Weeping Angel has provided yet another example of what hackers can do with IoT devices that do not have adequate security measures in place. If government agencies are using such methods for surveillance purposes, then it is sensible to assume that cybercriminals would use similar avenues to conduct their activities.

“This is by no means an isolated revelation. We demonstrated back in November that Tesla cars – and by association any other IoT-connected smart car – could be stolen if cybersecurity measures are not up to scratch. The IoT has almost limitless potential to enhance user experiences, but businesses should not blindly allow its continued proliferation if programmes such as Weeping Angel exist.”

Hansen believes that this latest WikiLeaks release proves that the need for watertight IoT security has reached a new level of importance. With both criminal and state-sponsored IoT hacking now taking place, there is a critical need for device manufacturers and programme and app developers to implement specialist software which is designed to guard against external threats.

He added: “Self-defending software, such as RASP (runtime application self-protection) technology is an option which should be front of mind for decision-makers in IoT-focused businesses. Such solutions can guard the apps and sensitive information held in IoT devices, and can block even the most ingenious attempts to access a device. This works regardless of how inherently insecure a device is, by binding to the specific applications that are in greatest need of protection.”

He concluded: “Weeping Angel has proven that the IoT cybersecurity stakes are higher than ever before. The sooner organisations realise that the power to fight back against those with sinister intentions is in their hands, the better.”

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Humanising the Internet of Things

Next Post

Shadow IT Is a Bigger Problem Than Most of Us Realize

Recent News

Data Privacy Day: Securing your data with a password manager

For Cybersecurity, the Tricks Come More Than Once a Year

March 31, 2023
cybersecurity training

Only 10% of workers remember all their cyber security training

March 30, 2023
Pie Chart, Purple

New API Report Shows 400% Increase in Attackers

March 29, 2023
Cato Networks delivers first CASB for instant visibility and control of cloud application data risk

Cato Networks Recognised as Leader in Single-Vendor SASE Quadrant Analysis

March 29, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information