日韩色综合-日韩色中色-日韩色在线-日韩色哟哟-国产ts在线视频-国产suv精品一区二区69

手機APP下載

您現在的位置: 首頁 > 在線廣播 > PBS高端訪談 > PBS訪談社會系列 > 正文

智能設備,使我們的生活更輕松也可能容易破解,聯邦貿易委員會說

編輯:sophie ?  可可英語APP下載 |  可可官方微信:ikekenet
  


掃描二維碼進行跟讀打分訓練

JEFFREY BROWN: Now New technology presents new concerns over privacy in unexpected places.

An ever-expanding array of appliances and household devices has made our lives easier and sometimes safer.

Now connected to the Web, they're becoming known as the Internet of things, baby monitors with cameras, home thermostats, even refrigerators.

These so-called smart devices are programmable and easy to access remotely, both by their owners and, as it turns out, by hackers.

Yesterday, the Federal Trade Commission cited one seller of Web-enabled video cams for its inadequate security protections.

It found that a breach in the company's software allowed hackers to post links to the live video feeds of its customers' security cameras.

Hari Sreenivasan takes the story from there.

HARI SREENIVASAN: Kashmir Hill is a senior editor and writes the technology and privacy column "Not-So Private Parts" at Forbes.com.

Thanks for joining us.

RELATED INFORMATION:Researchers Steer Off Course With Power of 'GPS Spoofing'

Let's start with putting this case in perspective.

The FTC ruling yesterday, is this just limited to one company, or are there are lots of other companies that have this weakens?

KASHMIR HILL, Forbes.com: It's not limited to one company.

There are several device makers who are making products that are connected to the Internet now and there are many that have security vulnerabilities.

Not only is TRENDnet not the only company that has vulnerable devices. It's not the only camera company.

Just a few weeks ago, another company out of China called Foscam had a baby monitor in a Texas family's home that was hacked by somebody who came in and started saying nasty things to a 2-year-old, until the father rushed in and unplugged the baby monitor.

HARI SREENIVASAN: That's horrible.

Now, you said in one of your articles that there's even a search engine to help people find this.

KASHMIR HILL: There is a search engine.

It's called Shodan. It's like Google. But where Google crawls for websites, this actually crawls the Internet looking for connected devices.

And it's found all kinds of things. It's found cars that are connected to the Internet, the cameras that we have heard about, building control systems for Google's headquarters in Australia and power plants and water filtration companies.

There are so many products now that are connected to the Internet, because it's so useful to be able to check on them or control things from afar.

But a lot of times, these products are being designed without good security, so that somebody can, one, see that they're there, and in some cases even go in and control those devices or access their streams.

HARI SREENIVASAN: And you have been one of those people. You hacked into a smart home. Tell us a little bit about that.

KASHMIR HILL: I have been one of those people.

I was talking to security researchers about some research that they had done around home automation systems.

And there was one particular product made by a company called Insteon that had no -- once a person had connected it to their home, it actually has no authentication system.

You didn't need a password to be able to access it.

And in some cases, the systems were showing up in Google search results.

You didn't even need Shodan to get to them. And so I was able to do a very simple Google search.

And I had a list of eight homes around the country where I was able to get in and turn on lights, turn water pumps on and off, potentially open garage doors.

And so, in one case, I called this man in Portland who had one of these systems, and I asked him, do you mind if I see if I can turn your lights on and off? And I did. And he was shocked.

He had no idea that anyone on the Internet could get access to his system.

HARI SREENIVASAN: So, what can someone do?

I mean, as you say, there are so many devices around us that are connected, most of us might not be as conscious about the privacy settings or the security settings on each of these devices and the services that we're using through them.

KASHMIR HILL: Yes, these devices are really convenient and there are a lot of benefits to them.

You know, the big responsibility is with the vendors and companies that make these products.

They need to make them with good security, so that consumers aren't put in this place where they're vulnerable.

Things that consumers can do, one, make sure that if you have a device that connects to the Internet that you can access from somewhere else that it has some kind of username and password attached to it.

If it comes with a default username or password, you should change that, because hackers can figure that out very quickly.

In one case, a hacker -- an anonymous user went through and connected to 400,000 devices on the Internet using default usernames and passwords.

So that's just not secure.

And if you're a very savvy user, you can set up a virtual private network through which your device connects to the Internet, so that somebody who is searching the Internet can't find it.

But I think that is above the technical levels of most consumers.

HARI SREENIVASAN: So is this something where technology is far ahead of any legislation to protect us or regulations?

KASHMIR HILL: At this point, you know, when you buy --

let's say you get tires from a tire company, and those tires are defective in some way, and it causes you to crash, you have the ability to go after that company.

At this point, we're not quite there with software.

We're still trying to figure out what the kind of privacy and security responsibilities are for companies that are providing and making these kinds of products.

The decision by the Federal Trade Commission to, you know, go after an I.P. cam maker that created vulnerable devices is telling.

And so the hope is that companies will avoid making these kind of vulnerable products to avoid getting in trouble with the FTC.

And the hope is that public shaming, appearing in negative news reports, will help.

But I don't know that the law has really caught up with the possibilities here.

HARI SREENIVASAN: All right, Kashmir Hill, thanks so much for joining us.

KASHMIR HILL: My pleasure.

JEFFREY BROWN: And that was Hari appearing from our new New York studio.

重點單詞   查看全部解釋    
inadequate [in'ædikwit]

想一想再看

adj. 不充分的,不適當的

 
privacy ['praivəsi]

想一想再看

n. 隱私,隱居,秘密

聯想記憶
secure [si'kjuə]

想一想再看

adj. 安全的,牢靠的,穩妥的
vt. 固定

聯想記憶
default [di'fɔ:lt]

想一想再看

n. 假設值,默認(值), 不履行責任,缺席 v. 默認

聯想記憶
tire ['taiə]

想一想再看

n. 輪胎,金屬圈
v. 使疲倦,厭煩

 
conscious ['kɔnʃəs]

想一想再看

adj. 神志清醒的,意識到的,自覺的,有意的

聯想記憶
smart [smɑ:t]

想一想再看

adj. 聰明的,時髦的,漂亮的,敏捷的,輕快的,整潔的

 
negative ['negətiv]

想一想再看

adj. 否定的,負的,消極的
n. 底片,負

聯想記憶
unexpected ['ʌnik'spektid]

想一想再看

adj. 想不到的,意外的

 
control [kən'trəul]

想一想再看

n. 克制,控制,管制,操作裝置
vt. 控制

 
?
發布評論我來說2句

    最新文章

    可可英語官方微信(微信號:ikekenet)

    每天向大家推送短小精悍的英語學習資料.

    添加方式1.掃描上方可可官方微信二維碼。
    添加方式2.搜索微信號ikekenet添加即可。
    主站蜘蛛池模板: 女人香韩国电影| 毒鲨| 芝加哥急救| 金鸳鸯| 清淮河| 麻豆视频免费在线观看| 速度与激情18| 小淳| 黄子华个人资料简介| 吻胸亲乳激情大尺度| 老板娘三| angela white电影| 1—36集电视剧在线观看| 少爷爱上保镖泰剧双男主| 老牛家的战争电视剧全集免费观看| stylistic device| julia taylor| 那个不为人知的故事电影演员表| 大决战全部演员表介绍图片| 桥段| 高欣生| 欧美黑人天堂av在线| 电影《三体》| 电影《追求》| 智乐星中考| 无线新闻| 短篇500篇 合集大结局| 拔萝卜电视剧免费观看全集在线播放下载 | 打美女屁股免费| douying| 勿言推理 电视剧| 帕米尔我的家乡多么美简谱| lanarhoades黑人系列| 捷克女人性ⅹxxxx视频| 爱欲告白| 色戒在线观看免费观看| 扫毒3:人在天涯 电影| 赌神电影| 朱莉娅·奥蒙德| 美国派7| 一人比划一人猜100个|