Computeractive

STOP WI-FI HACKERS

There’s something rather magical about products that ‘just work’. Smart TVs, speakers with built-in voice assistants and video doorbells all fall into this category. Plug them in, connect them to your Wi-Fi, and you’re ready to go. There’s very little to configure and usually even less to maintain.

The trouble is that such convenience can provide a false sense of security – and that can lead to complacency. Smart devices – just like computers – are often eminently hackable and you’re reliant on the manufacturer to remotely apply the necessary security patches and updates in a timely manner. If they don’t, you risk hosting an unsafe device on your network, which could put other devices, including your PC, at risk.

If you don’t believe us, read around. There have recently been reports of vulnerabilities in outdated Google doorbells (www.snipca.com/47425), and claims that devices from rival Ring have been accessed by hackers (www.snipca.com/47427). Researchers in Texas found a way to issue silent voice commands to smart-home devices (www.snipca.com/47428), while UK and Italian researchers managed to extract Wi-Fi passwords with the help of a smart light bulb (www.snipca.com/47429).

This means that if you’re running any internet-connected ‘smart’ device in your home, it’s essential to strengthen your defences, both through the device where possible, and on the network itself. Here we explain the most reliable ways to make your Wi-Fi unhackable.

YOUR SMART HOME SECURITY QUESTIONS ANSWERED

Why would anyone want to hack a smart device?

Some hackers break into devices purely for the fun of it or to prove they can do it. Similar to trainspotters collecting locomotive numbers, they want to add more and more conquests to their list. However, they’re not the ones you need to worry about.

A determined intruder usually has more malicious aims. To them, an insecure device is an entry ramp to your network. Many smart-home devices run sophisticated operating systems – often a version of Linux – designed to perform a specific range of functions. They may also contain a small amount of unused onboard storage.

When a hacker detects a vulnerable device, they can use that storage and the operating system’s dormant features to execute their own code. And, because the same smart devices are in millions of homes worldwide, the hacker can apply what they’ve learned about the vulnerabilities of one device to any other they come across, quickly building up a network of compromised gadgets under their control.

How do hackers find an insecure device?

Think of your router as a block of flats with a purely numerical street

You’re reading a preview, subscribe to read more.

More from Computeractive

Computeractive1 min read
On Sale Weds 8 May
The latest Intel processor in a reasonably priced laptop A colour ebook reader that lets you write on it as well as read These and much more… Subscribe to Computeractive at www.getcomputeractive.co.uk ■
Computeractive2 min read
Should I Pay For…?
www.snipca.com/50048 Price: £49.99 per year Free trial: N/A What you need: Windows 7, 8.1, 10 or 11 Like all Icecream programs, PDF Editor packs lots of useful features into a simple, attractive interface you can master in minutes. But it also adopts
Computeractive1 min read
Virgin Resumes Landline Switching But Not To Vulnerable Customers
Virgin has resumed switching landline customers to digital phones, but is excluding vulnerable people and those using a telecare device. It paused the Digital Landline Switchover programme in December following numerous reports of telecare systems no

Related Books & Audiobooks