Privacy Ref Blog

Quick Thoughts on IoT

Recently I saw an interesting image on twitter from @darrencauthon.  The image was a television with an alleged FBI notice notifying the individual that their new smart TV had “suspicious files” and that they were being penalized $500 before they could use their TV again.  All of this is accompanied by legal jargon meant to frighten the user into believing the hoax.  The bottom of the note is even signed by FBI Director James Comey himself apparently.  This is your classic example of ransomware and I immediately had a thought on what may cause this issue.

Your TV on ransomware

Your TV on ransomware

The text reads as follows:

As a result of full scanning of your device, some suspicious files have been found and your attendance of the forbidden pornographic sites has been fixed.  For this reason your device has been locked.

Information on your location and snapshots containing your face have been uploaded on the FBI cyber crime departments datacenter.

First of all, familiarize with the positions stated in section <<The legal basis of violations>>. According to these positions our actions bear criminal character, and you are a criminal subject.  The penalty as a base measure of punishment on you which you are obliged to pay in a current of three calendar days is imposed.

The size of the payment is $500.00

ATTENTION!

Disconnection or disposal of the device or your attempts to unlock the device independently will be apprehended as unapproved actions interfering the execution of the law of the united states of America (Read as section 1509 – investigations).  In this case and in case of penalty non-payment in a current of three calendar days from the date of this notification, the total amount of penalty will be tripled and the respective fines will be charged to the outstanding penalty. In case of dissent with the indicted prosecution, you have the right to challenge it in court.

To make a penalty payment, go to section <<Payment penalties>>

With the era of smart and connected devices it is more important than ever to make sure the devices are protected from external tampering by hackers.  The above example shows that the television was probably an easy target for the ransomware because, when it was manufactured and its operating system installed, there probably were minimal protections established.  This most likely stems from the issue that it is a “smart TV” but in reality, it is computer specialized to perform as a television.

All IoT devices are small, specialized computers and should have malware and other security protections installed just like a standard desktop computer would.  This requires a shift in perspective on the parts of all of us.  When your business gets involved with IoT devices, either selling or using them in your office, be sure to check how it is protected from outside threats and act accordingly.

Privacy Ref provides consulting and assessment services to build and improve organizational privacy programs. For more information call Privacy Ref at (888) 470-1528 or email us at info@privacyref.com

Posted on January 4, 2017 by Ben Siegel


« »

No Responses

Comments are closed.


« »

Subscribe to our mailing list

Please fill out the form below.

Required

Want to find out more?

Simply go to the contact page, fill out the form, and someone from Privacy Ref will be in touch with you. You can also send an email to info@privacyref.com or call (888) 470-1528.

News

April 16, 2018

IAPP Training Classes
Privacy Ref is proud to announce that we are an official training partner of the IAPP. You now have the opportunity to learn from one of our knowledgeable privacy professionals using the most respected training content in the industry. The robust interactive training offered, aids in the understanding of critical privacy concepts. The contents of the courses are integral to obtaining your privacy certifications and to educate your new team. Learn more here.

Latest Blog Posts

July 9, 2018

Don’t Forget Basic Communication
Most of us have been wrapped up in GDPR preparations for several months. While there are many organizations "not quite there yet", many others have made great strides towards compliance. As we continue to do assessments for clients, both GDPR and General Privacy,  I have been surprised at the frequency of the gap between a privacy official describing their organization's data subjects, information collected, and business processes  with the reality of what is happening. Continue reading this post...

California – The Next GDPR?
Starting January 1, 2020, if you are a for-profit company doing business in California, you may have new data privacy compliance obligations. Specifically, California just enacted the California Consumer Privacy Act of 2018 (the country’s strictest data privacy law to date), placing new privacy mandates on certain businesses with respect to the personal information of consumers (defined as natural persons who are California residents). Many aspects of the new law smack of EU-GDPR influences, such as a new and improved (in other words, broader) definition of personal information and the inclusion of guaranteed consumer rights with respect to such personal information. If your business is already in compliance with the EU’s GDPR, the California law will be nothing new to you. For other businesses, however, you have 18 months to get with the program. Continue reading this post...

Other Recent Posts

PRIVACY REF