IT security firm, Check Point, has published a report identifying network security vulnerabilities with EZCast, an HDMI dongle-based TV streamer that converts non-connected TVs into smart TVs.
The findings show a cyber criminal’s ability to gain full, unauthorised access to an EZCast subscriber’s home network, compromising personal information and taking control of home devices.
The EZCast dongle runs on its own Wi-Fi network and is controlled through a smartphone device or PC. Check Point said the device represents a growing trend of connecting devices to the Internet (or IoT) and represents unique security challenges for both consumers and business.
Check Point security research group manager, Oded Vanunu, said the research provides a glimpse of what will be the new normal in 2016 and beyond, with cyber criminals using creative ways to the exploit the cracks of a more connected world.
“The Internet of Things trend will continue to grow, and it will be important for consumers and businesses to think about how to protect their smart devices and prepare for the wider adoption of IoT.”
The research report shows how attackers can enter through the Wi-Fi system, allowing easy access into both the EZCast and home networks. After breaching the system, attackers can move around the networks undetected, providing the ability to view confidential information and infect home devices. These attacks can be initiated remotely from anywhere in the world.
- Smart Cities will use 1.6 billion connected things in 2016: Gartner
- IoT attacks and new evasion techniques will characterise threats in 2016: Fortinet
- Cisco launches Adelaide’s Smart City Studio
- Quest for greater business insights will drive Big Data growth: Splunk
- IoT and M2M solutions to lead 2016: Analysys Mason
- Incident response will be critical for the channel in 2016: Check Point
- Exclusive: Kurt Hansen leaves Check Point