The car as a gateway of ‘malware’ in a ‘smart city’

Most recent:
  • Kurt Sutter fired from ‘Mayans MC’: the series loses one of its creators for being an “asshole nasty”
  • The Outer Worlds presents its launch trailer; arrives on October 25
  • Samsung acknowledges the problem with the fingerprint reader of Samsung Galaxy S10+ and says that there is a patch on the way
    ‘Joker’: what really happens at the end and the connections with Batman the movie most commented of the year


    EUROPA PRESS

    • Are around 10 years for the 60% of humanity to live in true smart cities, as has been pointed out from Panda Secutiry.
    • In a smart city, all the devices, from the ‘smartphones’ until the cars will be connected and will be generating a large amount of information.
    • “The architects that design the smart cities of today and of the future must address the challenges of cybersecurity in all of its designs,” says the company.

    smart City

    it Is estimated that are 10 or 12 years for the 60% of humanity lives on true smart cities, as has been pointed out from Panda Secutiry, in which the digital devices that we carry with us, from a mobile phone to a car connected to the Internet, will serve as a key of access to any place.

    In the security company have been raised what would happen if someone decides to attack all a ‘smart city’ using the same principle of the ‘Trojan horse’. As explained, the way in which the spread of the ‘malware’ would be similar to the pollination.

    The evolution, they explain, has meant that the flowers have vivid colors and a few special fragrances, so the birds and insects will feel attracted by them. So, when they land on your petals pervade their pollen and, when you get close to another flower, are part of the pollination process.

    that Is to say, although the flowers are unable to move by themselves, they are able to play with the help unconscious and involuntary third-party. With many computer viruses something similar, as pointed out in a press release.

    When he close all the Internet connections of a device, the virus needs someone or something to the transport and the ‘deposit’ in another place. Although the main vector of attack in this area is the Internet, researchers from Panda Security suggests that you have to be cautious with items that are not apparently connected to the network, as with a USB abandoned in the street.

    The Trojan horse of a ‘Smart City’

    In a smart city, all devices, since the ‘smartphones’ of the citizens, until the same cars that lead, be connected. And will be generating a large amount of information, which is stored in the own cities and shared with other ‘smart cities’ to improve, among other things, the traffic of people between them.

    we are increasingly aware of the misuse that can make of our personal data the criminals, but, as a request from the company, it is possible to imagine what would happen if you use the cars as “Trojan horses” to transport ‘malware’ from one city to another.

    If this virus, as explained, could be in the hundreds or thousands of cars, could be used to make a Denial of Service Attack (DDoS, for its acronym in English) and, for example, put all the traffic lights of a city in green.

    For all this, “the architects that design the smart cities of today and of the future should raise the challenges of cybersecurity in all their designs, as pointed out by Global Retail Product Manager at Panda Security, Hervé Lambert.

    hardware manufacturers and policy-makers of the smart cities should, as it explains Lambert, “to be aware of the importance of installing the devices that they can install antivirus, do an audit of cyber-security and constant updates, which are the only way to protect cities from possible cyber attacks”.

    Tecnología

    The car as a gateway of ‘malware’ in a ‘smart city’
    Source: www.20minutos.es  
    November 19, 2017

    Next Random post