“In A Day Where Everything Is Getting Smarter, It Might Be Smarter To Play Dumb”

  • 0

“In A Day Where Everything Is Getting Smarter, It Might Be Smarter To Play Dumb”

Dear Blast Readers,

 

Did you know that 6.6 million people in the US are stalked every year*? Only 1 in 5 victims are stalked by strangers*. 85% of stalking victims know who their stalkers are*. Did you know that there are 78% of stalkers use more than 1 approach when it comes to stalking their victims*?

 

We live in a day and age where technology is continuing to get smarter. With technology getting smarter so are the cyber criminals. Today Cyber criminals are always looking for vulnerabilities and back doors to provide access to his or her next victim.

 

Recently, vulnerabilities in cyber security have been found hiding and lurking in the shadows of smart appliances. Some examples of smart appliances include:

  • Smart Refrigerators
  • Smart Slow Cookers
  • Smart Dish Plates

 

Smart Refrigerators can have 3 built in cameras, that allow you to see inside of the Refrigerators from where ever you are. They also can have the capability of streaming music, streaming videos, as well as sharing calendars, notes, memos and pictures. The Smart Refrigerators can also have voice activated features. If these refrigerators fell victim to a hack attack, then hackers would have total control over all the features.

 

By hacking the Smart Refrigerators, hackers can then peer into your life. Watching you, your spouse, and even your children with the help of the video feed that comes from the Smart Refrigerators cameras.

 

Also, they can listen to every conversation going on inside your home because of the voice activation speakers (the speakers that help to refrigerator listen and respond to your commands).

 

The Smart Refrigerators can also share calendars, notes, memos and pictures. If a hacker was to gain access to this information, it could be sold on the dark net to someone with malicious intent. But, you could also be stalked. With this information, a stalker would know your schedule, know what your family and friends look like, where your favorite places are, among other things.

 

A Smart Slow Cooker is another smart device that cyber criminals and/or hackers could use to their malicious advantages. Being a Bluetooth connected device allows the Smart Slow Cooker to connect to smartphones (both Android and iOS devices), and tablets that have the Smart Slow Cookers application. From this application, you can control all the features, including:

  • Adjusting the temperature
  • Turning the Smart Slow Cooker on/off

 

With access to the Smart Slow Cookers, hackers would be able to get into the application and mess with the settings. They would be able to turn it on and off as they pleased, they would also be able to control the heat settings, possibly being able to blow the power source creating a fire. Hackers would be able to do all of this without the consent or knowledge of the device’s owners.

 

Do you wear a fitness tracker on your wrist consistently? Do you monitor your caloric intake with said device? Did you know there is a Smart Dish Plate that can help you track your eating habits and calorie intake? The Smart Dish Plate is Bluetooth and Wi-Fi connected. It connects to your smartphone, via application, and your fitness tracker. It also has 3-mini built in cameras.

 

If hackers and/or cyber criminals were to gain control over this device, then it is likely that your phone and its data will be targeted as well. This leads to the possibly that this data could be sold on the dark net.

 

With the 3-mini built in cameras, hackers would also be able to spy on you through the camera feed.

 

By gaining access to the smart kitchen appliances, hackers can do many things without your knowledge or consent. They can control the device and all its features and they can also gain access to any other internet connected device connected the same network, including:

  • Smartphones
  • Tablets
  • Computers
  • Alarm systems

 

If you have any questions about hacking or cyber security contact FDS Global. You can reach us at our office at (954) 727-1957 or by email at RMoody@FDS.Global. Please Feel free to visit our website at www.FDS.Global.

 

 

 

*(The statistics represented in this blast were identified from: Stalking Information. N.p., n.d. Web. 17 Apr. 2017.)*


  • 2

“The Brain Behind The Internet”

Dear Blast Readers,

 Is the internet just one giant brain? Nowadays, the average person spends a lot of their personal and professional lives on the internet. Much of this time is spent doing things like:

·        Streaming Music

·        Streaming Videos

·        Checking Emails (both personal and work accounts alike)

·        Going on social media accounts

·        Reading the news

 

Even though a person spends a good amount of time online, there are a lot of people out there that don’t know how the internet works. Or what algorithms are, or how they control the internet.

 

Did you know that a recent discovery shows that there is an algorithm that is used for the internet, that functions similarly to the way the human brain processes information?

 

This algorithm that controls the flow of information for the internet acts like the human brain when it controls information from stimuli entering the brain.

 

Both for the internet and for the brain, the purpose of controlling the flow of information is to get the optimal amount of traffic, or information to come in or out.

 

This is important to prevent either too little or too much information from being interpreted. If too little information is passing through, then the processes for both the brain or the internet would be inefficient. If too much information is passing through, then an overload could occur.

 

For a human, when their brain is overloaded they can experience a sensory overload which can prevent them from functioning normally. For the internet, if too much information is flowing in then the servers controlling the internet can crash, similarly to a sensory overload.

 

The internet algorithm that controls information coming in and out is “AIMD” (Additive Increase, Multiplicative Decrease). This algorithm controls the process of your computer sending out or receiving data packets. Data packets are just like the information taken into the brain.

 

The way in which AIMD works is that when a data packet is sent across the internet the server receiving the packet must acknowledge the receipt of it. If the server acknowledged the data packet on-time, then your data can be transmitted at a higher rate without overloading the network. If the data packet is not acknowledged promptly (say it is lost or delayed) then your computer knows there is traffic and slows down the transmission of information. This is the strategy utilized by computers to maximize efficiency.

 

As it happens there is an equivalent for how the brain functions. The brain when taking in information begins to prioritize the information coming in. As long as there is not too much information coming in, then the brain will continue to process the information coming in at a consistent speed just like AIMD. If too much sensory information comes into the brain then information can be delayed or lost in the interpretation process, this is called sensory overload.

 

So, the internet may just be one giant brain.

 

If you have any questions relating to computer forensics or cyber security contact FDS Global. You can reach us at our office at (954) 727-1957 or by email at RMoody@FDS.Global. Please feel free to visit our website at www.FDS.Global.