Article suggestions: Difference between revisions
Suggesting article: IoT Security |
No edit summary |
||
Line 169: | Line 169: | ||
|- | |- | ||
|Not applicable | |Not applicable | ||
|IoT Security | |[[IoT Security]] | ||
Companies' love for IoT does, unfortunately, not come with security for the data of their customers. This exposes the customers to risks of ID theft, remote hacking, ransomware attacks, surveillance (continue list) among others. These concerns are not limited to smart home devices like thermostats, but any device with remote control features, including vehicles going back as far as 2012. This could include not only flaws of companies, but be a general article listing protocols and software commonly used for IoT. | Companies' love for IoT does, unfortunately, not come with security for the data of their customers. This exposes the customers to risks of ID theft, remote hacking, ransomware attacks, surveillance (continue list) among others. These concerns are not limited to smart home devices like thermostats, but any device with remote control features, including vehicles going back as far as 2012. This could include not only flaws of companies, but be a general article listing protocols and software commonly used for IoT. | ||
|<ref name="What We Do About Data Security">{{Cite news |last=Zimmer |first=Morten |title=What We Do About Data Security (And Why You Should Care) |url=https://ojelectronics.com/floorheating/news/what-we-do-about-data-security/ |website=OJ Electronics |date=Apr 28, 2024 |access-date=Aug 12, 2025 |url-status=live |archive-url=https://web.archive.org/web/20250324235150/https://ojelectronics.com/floorheating/news/what-we-do-about-data-security/ |archive-date= | |<ref name="What We Do About Data Security">{{Cite news |last=Zimmer |first=Morten |title=What We Do About Data Security (And Why You Should Care) |url=https://ojelectronics.com/floorheating/news/what-we-do-about-data-security/ |website=OJ Electronics |date=Apr 28, 2024 |access-date=Aug 12, 2025 |url-status=live |archive-url=https://web.archive.org/web/20250324235150/https://ojelectronics.com/floorheating/news/what-we-do-about-data-security/ |archive-date=Mar 24, 2025 }}</ref><ref>{{cite web|last=Kovacs |first=Eduard |title=Flaws in Major Automaker’s Dealership Systems Allowed Car Hacking, Personal Data Theft |url=https://www.securityweek.com/flaws-in-major-automakers-dealership-systems-allowed-car-hacking-personal-data-theft/ |website=Security Week |date=Aug 11, 2025 |access-date=Aug 12, 2025 |url-status=live}}</ref><ref>{{Cite news |last=Arghire |first=Ionut |title=Subaru Starlink Vulnerability Exposed Cars to Remote Hacking |url=https://www.securityweek.com/subaru-starlink-vulnerability-exposed-cars-to-remote-hacking/ |website=Security Week |date=Jan 24, 2025 |access-date=Aug 12, 2025 |url-status=live}}</ref><ref>{{cite news |last=Kovacs |first=Eduard |title=Millions of Cars Exposed to Remote Hacking via PerfektBlue Attack |url=https://www.securityweek.com/millions-of-cars-exposed-to-remote-hacking-via-perfektblue-attack/ |website=Security Week |date=Jul 10, 2025 |access-date=Aug 12, 2025 |url-status=live}}</ref> | ||
|} | |} | ||