By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
10alert.com10alert.com
  • Threats
    • WordPress ThreatsDanger
    Threats
    A cyber or cybersecurity threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. Cyber threats include…
    Show More
    Top News
    Morris Worm Turns 25
    8 months ago
    Meet the iPhone malware that tracks your every move
    8 months ago
    Virus can inflict physical harm onto a PC: myth or truth?
    8 months ago
    Latest News
    Triangulation: Trojan for iOS | Kaspersky official blog
    5 days ago
    Wordfence Intelligence Weekly WordPress Vulnerability Report (May 22, 2023 to May 28, 2023)
    5 days ago
    Safeguards against firmware signed with stolen MSI keys
    7 days ago
    WPDeveloper Addresses Privilege Escalation Vulnerability in ReviewX WordPress Plugin
    7 days ago
  • Fix
    Fix
    Troubleshooting guide you need when errors, bugs or technical glitches might ruin your digital experience.
    Show More
    Top News
    Why none of the Windows 8 upgrade guides you find will help
    8 months ago
    Windows 11 build 25188 outs with touch keyboard updates
    8 months ago
    How to upgrade from Windows 10 to Windows 11
    8 months ago
    Latest News
    How automatically delete unused files from my Downloads folder?
    4 months ago
    Now you can speed up any video in your browser
    4 months ago
    How to restore access to a file after EFS or view it on another computer?
    4 months ago
    18 Proven Tips to Speed Up Your WordPress Site and Improve SEO | 2023 Guide
    5 months ago
  • How To
    How ToShow More
    Nine years of Project Galileo and how the last year has changed it
    Nine years of Project Galileo and how the last year has changed it
    20 hours ago
    Dynamic data collection with Zaraz Worker Variables
    Dynamic data collection with Zaraz Worker Variables
    4 days ago
    Reduce latency and increase cache hits with Regional Tiered Cache
    Reduce latency and increase cache hits with Regional Tiered Cache
    5 days ago
    Cloudflare is deprecating Railgun
    Cloudflare is deprecating Railgun
    5 days ago
    What is two-factor authentication | Kaspersky official blog
    1 week ago
  • News
    News
    This category of resources includes the latest technology news and updates, covering a wide range of topics and innovations in the tech industry. From new…
    Show More
    Top News
    How to set parental controls on Windows 10?
    8 months ago
    How to use Shazam in curtain on Android?
    8 months ago
    How to Make Chrome Smoother
    8 months ago
    Latest News
    How to generate SSH keys on Windows 11
    10 hours ago
    How to enable file sharing on WSA for Windows 11
    10 hours ago
    How to add CPU, GPU, RAM widgets on Windows 11
    5 days ago
    How to create virtual drive (VHD, VHDX, Dev Drive) on Windows 11
    1 week ago
  • Glossary
  • My Bookmarks
Reading: Should we be more concerned about smart city tech?
Share
Notification Show More
Aa
Aa
10alert.com10alert.com
  • Threats
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
  • Threats
    • WordPress ThreatsDanger
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
Follow US
ThreatsWordpress Threats

Should we be more concerned about smart city tech?

Vitus White
Last updated: 13 October
Vitus White 4 years ago
Share
6 Min Read

Imagine someone shut down all of the traffic lights in New York City at 4 pm.

That idea has been stuck in my head since Ryan Naraine mentioned it at a round table talk on securing smart cities at Black Hat.

Although the conversation was held primarily among some very technical researchers, the idea of the traffic lights failing in one of the world’s busiest cities was one that I could not shake. Nowadays, everything is connected online — your phone, TV, watch, fitness tracker, maybe even your front door. But did you know that our traffic lights, train systems, and power grid are also online?

It is actually quite scary to think about what could happen if one of the industrial systems that are vital to our everyday lives were to be turned off.

Power?
Trains?
Traffic lights?

Any of those three could be quite deadly if used improperly. But as with many things, security for smart cities is not where it needs to be.

Ryan Naraine talking #smartcities and securing them #ioasis #klbh #blackhat2016

A photo posted by Kaspersky Lab (@kasperskylab) on Aug 3, 2016 at 12:56pm PDT

Bureaucratic red tape and development times for the systems mean security becomes an afterthought in many cases.

The conversation surrounding this issue on the security end is equally annoying. It goes in circles within the security community — and doesn’t go anywhere outside of the security world because average Joes don’t think about it at all, although they should.

When it comes to security, we often focus on the things that we personally use day to day: computers, mobile devices, fitness trackers, and so forth. But those items, as essential as they may feel, are really luxuries, not daily necessities. It’s a huge pain when they get hacked, but they are not typically something that could, say, kill you.

Hacking electricity, water, and food https://t.co/puKzqEPXTa #ICS pic.twitter.com/L4ibbptbXM

— Kaspersky Lab (@kaspersky) July 15, 2016

During our AMA a few weeks back, one questioner asked: I was wondering if you had any predictions with regards to when we will start seeing mass casualties and perhaps even death from hacking into ICS [industrial control systems]? Is it possible now? Following from the German steel mill attack, the Black Energy malware, and the Swedish air traffic control attack it feels like we’re on the brink of something but not quite there yet.

Brian Bartholomew answered: Great question and a tough one to ask to the experts. In my opinion, it’s a matter of time before someone, somewhere decides to cross that line and cause casualties. If you look at all the critical systems that are still unsecured and vulnerable to attacks, all it would take is one crazy person and a general understanding of how ICS works to inflict damage to the masses.

This is why securing ICS should be the number 1 thing policy makers and other experts in the field should be focusing on right now. We need more voices like yours out there asking these tough questions to the appropriate people. Regarding who does it… well, again in my opinion, no one is doing it “well.” Well isn’t good enough. It needs to be impenetrable, and right now, that’s not the case. This isn’t a mythological unicorn any longer. It’s been done before and will only get worse.

Black Hat and DEF CON: Hacking a chemical plant – https://t.co/KSnCTtLt5U

— Kaspersky Lab (@kaspersky) August 19, 2015

Vitaly Kamluk answered: Honestly, I don’t want to think about it. Last time I thought about the possibility of malware crossing the border between virtual and physical worlds to destroy a physical object, Stuxnet happened just the next month. I was thinking only about “why so soon?” back then. I feel same strange feeling every time I hear about sudden disasters such as crashed planes, derailed trains, etc.

A security researcher widely known as halvarflake said earlier this year (reconstructed from my memory): “Physical objects can be owned and/or possessed by you. Computer systems have an additional dimension, which is control: You may own a computer, possess a computer, but with current systems design you can never be sure who is in control.”

This is what wakes me up at night, because this illusion of control we have over computer systems opens infinite possibilities to create tragedies by people who use their power against others.

So, what can be done about this troubling issue?

For starters, as global citizens, we can — and must — pay attention to what our elected officials are doing to keep us safe.

Before #Stuxnet, there was little thought about proactively securing industrial facilities https://t.co/2r3pXlbf7Z pic.twitter.com/vvj9ChCHAb

— Kaspersky Lab (@kaspersky) November 18, 2014

Education and awareness are vital. This conversation needs to grow beyond the security realm and hit the prime time news. A hack of these very sensitive systems could be nothing less than disastrous. It really is something that we should be focusing on more than, say, a celebrity scandal or a dating site hack.


Source: kaspersky.com

Translate this article

TAGGED: DoS, Malware, Security, Threats
Vitus White October 13, 2022 September 30, 2019
Share this Article
Facebook Twitter Reddit Telegram Email Copy Link Print

STAY CONECTED

24.8k Followers Like
253.9k Followers Follow
33.7k Subscribers Subscribe
124.8k Members Follow

LAST 10 ALERT

How to generate SSH keys on Windows 11
News 13 hours ago
How to enable file sharing on WSA for Windows 11
News 13 hours ago
Nine years of Project Galileo and how the last year has changed it
Nine years of Project Galileo and how the last year has changed it
Apps 20 hours ago
Dynamic data collection with Zaraz Worker Variables
Dynamic data collection with Zaraz Worker Variables
Apps 4 days ago
How to add CPU, GPU, RAM widgets on Windows 11
News 5 days ago

Recent Posts

  • How to generate SSH keys on Windows 11
  • How to enable file sharing on WSA for Windows 11
  • Nine years of Project Galileo and how the last year has changed it
  • Dynamic data collection with Zaraz Worker Variables
  • How to add CPU, GPU, RAM widgets on Windows 11

You Might Also Like

News

How to generate SSH keys on Windows 11

13 hours ago
Nine years of Project Galileo and how the last year has changed it
Apps

Nine years of Project Galileo and how the last year has changed it

20 hours ago
Dynamic data collection with Zaraz Worker Variables
Apps

Dynamic data collection with Zaraz Worker Variables

4 days ago
Cloudflare is deprecating Railgun
Apps

Cloudflare is deprecating Railgun

5 days ago
Show More

Related stories

How to Use Cloudflare to Secure Your WordPress Site
How To Starting Chrome from the command line
How to fix error 0x80070057 in Chrome?
Windows 10 How To Disable Slide to Shutdown
Windows search not working (FIX)
How to watch movies and TV series for free on Kinopoisk?
Previous Next

10 New Stories

Reduce latency and increase cache hits with Regional Tiered Cache
Cloudflare is deprecating Railgun
Triangulation: Trojan for iOS | Kaspersky official blog
Wordfence Intelligence Weekly WordPress Vulnerability Report (May 22, 2023 to May 28, 2023)
Safeguards against firmware signed with stolen MSI keys
WPDeveloper Addresses Privilege Escalation Vulnerability in ReviewX WordPress Plugin
Previous Next
Hot News
How to generate SSH keys on Windows 11
How to enable file sharing on WSA for Windows 11
Nine years of Project Galileo and how the last year has changed it
Dynamic data collection with Zaraz Worker Variables
How to add CPU, GPU, RAM widgets on Windows 11
10alert.com10alert.com
Follow US

© 10 Alert Network. All Rights Reserved.

  • Privacy Policy
  • Contact
  • Customize Interests
  • My Bookmarks
  • Glossary
Go to mobile version
adbanner
AdBlock Detected
Our site is an advertising supported site. Please whitelist to support our site.
Okay, I'll Whitelist
Welcome Back!

Sign in to your account

Lost your password?