{"id":58018,"date":"2018-11-02T00:00:00","date_gmt":"2018-11-01T22:00:00","guid":{"rendered":"https:\/\/richardvanhooijdonk.com\/blog\/all-the-surprising-and-scary-ways-you-and-your-systems-can-be-hacked\/"},"modified":"2021-07-12T08:38:03","modified_gmt":"2021-07-12T06:38:03","slug":"all-the-surprising-and-scary-ways-you-and-your-systems-can-be-hacked","status":"publish","type":"post","link":"https:\/\/blog.richardvanhooijdonk.com\/en\/all-the-surprising-and-scary-ways-you-and-your-systems-can-be-hacked\/","title":{"rendered":"All the surprising and scary ways you (and your systems) can be hacked"},"content":{"rendered":"<ul class=\"bold-list\">\n<li>The number of IoT devices is predicted to reach 26 billion by 2020<\/li>\n<li>Sometimes, a simple web search is all it takes to hack a smart home device<\/li>\n<li>The Mirai botnet attack made IoT security a hot topic<\/li>\n<li>The world\u2019s governments are finally starting to take the threat seriously<\/li>\n<\/ul>\n<p>Security is usually something people take very seriously. That\u2019s why you don\u2019t leave your front door or your car unlocked or let any random stranger off the street simply walk into your home. Yet, most people just don\u2019t seem to apply the same level of scrutiny to the smart devices they bring into their homes, despite their well-documented security issues. And that\u2019s a big mistake.<\/p>\n<p><iframe title=\"All the surprising and scary ways you (and your systems) can be hacked\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/CD6N2ZDR3YY?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<h2>The number of IoT devices is predicted to reach 26 billion by 2020<\/h2>\n<p>Over the last couple of years, we\u2019ve witnessed a proliferation of smart home devices, ranging from the extremely useful to the downright bizarre. While it may be perfectly reasonable for a security camera to be connected to the internet, the same can\u2019t exactly be said for something like a toaster, a vacuum cleaner, or a trash can. Yet, since they make our lives easier and more convenient, people keep buying them, and about 62 per cent of US adults now <a href=\"https:\/\/hackernoon.com\/the-dangerous-state-of-iot-security-e12d27552145\">own<\/a> at least one connected device. Gartner <a href=\"https:\/\/blog.hubspot.com\/marketing\/internet-of-things-security\">predicts<\/a> that there will be more than 26 billion IoT devices in the world by 2020, while the value of the global IoT market is expected to reach 1.7 trillion by 2019. Perhaps unsurprisingly, this growth in the number of IoT devices has been accompanied by the rising incidence of cyber-attacks directed against them, with Symantec <a href=\"https:\/\/resource.elq.symantec.com\/LP=5840?cid=70138000000rm1eAAA\">reporting<\/a> a staggering 600 per cent increase in the total number of IoT attacks between 2016 and 2017.<\/p>\n<figure id=\"attachment_32952\" aria-describedby=\"caption-attachment-32952\" style=\"width: 800px\" class=\"wp-caption aligncenter\"><img fetchpriority=\"high\" decoding=\"async\" class=\"wp-image-32952 size-full\" src=\"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/sites\/4\/2019\/05\/IoT-security.jpg\" alt=\"Cybercriminal with hoodie in dark room \" width=\"800\" height=\"534\" \/><figcaption id=\"caption-attachment-32952\" class=\"wp-caption-text\">Over the last couple of years, we\u2019ve witnessed a proliferation of smart home devices, ranging from the extremely useful to the downright bizarre.<\/figcaption><\/figure>\n<h2>Sometimes, a simple web search is all it takes to hack a smart home device<\/h2>\n<p>IoT technology can be incredibly vulnerable to hacking, and each new device you bring into your home represents a potential point of entry for <a href=\"https:\/\/blog.richardvanhooijdonk.com\/en\/keynote\/the-future-of-cybercrime-and-terrorism\/\">cyber-criminals<\/a>. The main reason for this lack of security is that manufacturers, rushing to take their products to market to take advantage of this booming trend, often disregard this aspect during product development. It takes time and money to implement strong security features into IoT devices and it can potentially hinder their performance, so manufacturers often decide that it\u2019s just not worth the effort.<\/p>\n<p><iframe title=\"Could your smart home be hacked? - Which? investigation\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/rM_yeh-N3RQ?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<p>Assigning weak login credentials, such as \u2018admin\u2019, \u201812345\u2019, \u2018root\u2019, or \u2018password\u2019, is one of the most common ways manufacturers leave their devices exposed to outside attacks. A 2017 study by Positive Technologies <a href=\"http:\/\/blog.ptsecurity.com\/2017\/06\/practical-ways-to-misuse-router.html\">revealed<\/a> that 15 per cent of IoT devices out there (in shops and in people\u2019s homes) still use default login credentials, while 10 per cent of them have been assigned one of the five most popular username\/password pairs. To make matters worse, these credentials are often hard-coded into the devices, which means that users can\u2019t change them even if they wanted to. As a result, all it takes for a hacker to gain access to the device is a simple web search for its default username and password.<\/p>\n<p>A recent study by researchers at Ben-Gurion University <a href=\"https:\/\/newatlas.com\/iot-smart-home-hacked-passwords-bgu\/53816\/\">reveals<\/a> just how easy it is to compromise smart home devices. The study encompassed 16 off-the-shelf smart home devices, including home security cameras, doorbells, thermostats, and baby monitors, some of which they were able to hack in less than half an hour. \u201cIt only took 30 minutes to find passwords for most of the devices and some of them were found only through a Google search of the brand,\u201d <a href=\"https:\/\/newatlas.com\/iot-smart-home-hacked-passwords-bgu\/53816\/\">says<\/a> Omer Shwartz, one of the researchers on the project. \u201cOnce hackers can access an IoT device, like a camera, they can create an entire network of these camera models controlled remotely.\u201d <a href=\"https:\/\/newatlas.com\/iot-smart-home-hacked-passwords-bgu\/53816\/\">According to<\/a> Yossi Oren, another one of the researchers, they were able to \u201cplay loud music through a baby monitor, turn off a thermostat and turn on a camera remotely\u201d.<\/p>\n<h2>The Mirai botnet attack made IoT security a hot topic<\/h2>\n<p>The first recorded IoT-based cyber-attack involving everyday smart home devices <a href=\"https:\/\/www.marketwatch.com\/press-release\/proofpoint-uncovers-internet-of-things-iot-cyberattack-2014-01-16?reflink=MW_news_stmp\">occurred<\/a> between December 2013 and January 2014, when cyber-criminals took control of more than 100,000 compromised IoT devices, including routers, TVs, multimedia centres, and refrigerators, and used them to send more than 750,000 malicious emails to individuals and enterprises. The attack proved difficult to block because they never sent more than 10 emails from a single IP address. Things have gotten progressively worse since then, culminating with the now infamous Mirai botnet attack in October 2016. During this attack, hackers used a network composed of poorly secured devices like routers and security cameras to launch the largest DDoS attack in history on Dyn, the company that controls much of the world\u2019s DNS infrastructure. The attack resulted in some of the world\u2019s most popular websites, including Twitter, Netflix, PayPal, Reddit, and the PlayStation Network to be unavailable.<\/p>\n<figure id=\"attachment_32954\" aria-describedby=\"caption-attachment-32954\" style=\"width: 801px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" class=\"wp-image-32954 size-full\" src=\"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/sites\/4\/2019\/05\/Mirai-attack.jpg\" alt=\"Digital world map indicating details of cyber attacks\" width=\"801\" height=\"471\" \/><figcaption id=\"caption-attachment-32954\" class=\"wp-caption-text\">The first recorded IoT-based cyber-attack involving everyday smart home devices occurred between December 2013 and January 2014, when cyber-criminals took control of more than 100,000 compromised IoT devices, including routers, TVs, multimedia centres, and refrigerators, and used them to send more than 750,000 malicious emails to individuals and enterprises.<\/figcaption><\/figure>\n<p>And it seems like researchers are discovering new major flaws and vulnerabilities in IoT devices every week. In July 2017, the IoT security firm Senrio <a href=\"https:\/\/www.wired.com\/story\/devils-ivy-iot-vulnerability\/\">announced<\/a> it discovered a security flaw in a piece of code used in a wide range of physical security products, including security cameras, sensors, and access-card readers, which allows attackers to gain access to an otherwise secure network using a single vulnerable device. Known as the Devil\u2019s Ivy, the vulnerability affects millions of existing IoT devices, and although some of the manufacturers have already issued patches to fix the problem, many of these devices remain unprotected. To demonstrate just how dangerous this flaw can be, Senrio <a href=\"https:\/\/www.wired.com\/story\/elaborate-hack-shows-damage-iot-bugs-can-do\/\">staged<\/a> a fake attack in which it took control of a security camera and a router that are still known to be vulnerable to the flaw. During the attack, they gained access to other secured devices on the network that contained financial and private data.<\/p>\n<h2>The world\u2019s governments are finally starting to take the threat seriously<\/h2>\n<p>This prompted even the FBI to get involved and <a href=\"https:\/\/www.zdnet.com\/article\/iot-security-warning-your-hacked-devices-are-being-used-for-cyber-crime-says-fbi\/\">issue<\/a> an alert warning people about the dangers of unsecured IoT devices. \u201cDevices in developed nations are particularly attractive targets because they allow access to many business websites that block traffic from suspicious or foreign IP addresses. Cyber actors use the compromised device&#8217;s IP address to engage in intrusion activities, making it difficult to filter regular traffic from malicious traffic,\u201d <a href=\"https:\/\/www.zdnet.com\/article\/iot-security-warning-your-hacked-devices-are-being-used-for-cyber-crime-says-fbi\/\">notes<\/a> the alert. According to the FBI, the attackers can use these devices to send spam emails, generate click-fraud activities, conduct credential stuffing attacks, and sell or lease IoT botnets to others.<\/p>\n<p>The US government responded to this growing threat by passing the Internet of Things Cybersecurity Improvement Act in 2017, which sets security standards for IoT devices that are sold to the government. While the act currently only protects the government from IoT security threats and doesn\u2019t reference consumer devices, it still marks an important step towards solving this issue. Similarly, the UK government is also working on setting security rules for IoT products, while the European Union&#8217;s cybersecurity agency ENISA is looking to establish a common policy framework for IoT security.<\/p>\n<p>IoT devices have brought unprecedented convenience to our lives, and judging by the numbers, they\u2019re here to stay \u2013 security flaws and all. So, is there anything users can do to protect themselves? The simplest solution would be not to buy any IoT devices in the first place, but that\u2019s not very likely to happen. The next best thing you can do is make sure to buy IoT devices only from reputable manufacturers that have demonstrated they take security seriously. Then, you need to immediately change the default login credentials and never use the same password for multiple devices. And, last but not least, try to keep your IoT devices on a separate network and make sure they\u2019re always up to date. That way, you\u2019ll be able to enjoy the convenience IoT devices provide safely and securely.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The number of IoT devices is predicted to reach 26 billion by 2020 Sometimes, a simple web search is all it takes to hack a smart home device The Mirai botnet attack made IoT security a hot topic The world\u2019s governments are finally starting to take the threat seriously Security is usually something people take [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":50657,"parent":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[2885],"tags":[4464,4218],"article-type":[],"trends":[5464],"class_list":["post-58018","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybercrime","tag-cybercrime","tag-future","trends-iot-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>All the surprising and scary ways you (and your systems) can be hacked - Richard van Hooijdonk Blog<\/title>\n<meta name=\"description\" content=\"IoT devices can be extremely vulnerable to cyberattacks due to security issues. What can users do to protect themselves? &amp;#x2705\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.richardvanhooijdonk.com\/en\/all-the-surprising-and-scary-ways-you-and-your-systems-can-be-hacked\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"All the surprising and scary ways you (and your systems) can be hacked - Richard van Hooijdonk Blog\" \/>\n<meta property=\"og:description\" content=\"IoT devices can be extremely vulnerable to cyberattacks due to security issues. What can users do to protect themselves? &amp;#x2705\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.richardvanhooijdonk.com\/en\/all-the-surprising-and-scary-ways-you-and-your-systems-can-be-hacked\/\" \/>\n<meta property=\"og:site_name\" content=\"Richard van Hooijdonk Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-11-01T22:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-12T06:38:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/shutterstock_1064084909.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"526\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Hein\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hein\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/all-the-surprising-and-scary-ways-you-and-your-systems-can-be-hacked\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/all-the-surprising-and-scary-ways-you-and-your-systems-can-be-hacked\\\/\"},\"author\":{\"name\":\"Hein\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#\\\/schema\\\/person\\\/cd9351ef31c33ebb6dd4efd845fe2b37\"},\"headline\":\"All the surprising and scary ways you (and your systems) can be hacked\",\"datePublished\":\"2018-11-01T22:00:00+00:00\",\"dateModified\":\"2021-07-12T06:38:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/all-the-surprising-and-scary-ways-you-and-your-systems-can-be-hacked\\\/\"},\"wordCount\":1412,\"publisher\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/all-the-surprising-and-scary-ways-you-and-your-systems-can-be-hacked\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/shutterstock_1064084909.jpg\",\"keywords\":[\"cybercrime\",\"future\"],\"articleSection\":[\"Cybercrime\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/all-the-surprising-and-scary-ways-you-and-your-systems-can-be-hacked\\\/\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/all-the-surprising-and-scary-ways-you-and-your-systems-can-be-hacked\\\/\",\"name\":\"All the surprising and scary ways you (and your systems) can be hacked - Richard van Hooijdonk Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/all-the-surprising-and-scary-ways-you-and-your-systems-can-be-hacked\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/all-the-surprising-and-scary-ways-you-and-your-systems-can-be-hacked\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/shutterstock_1064084909.jpg\",\"datePublished\":\"2018-11-01T22:00:00+00:00\",\"dateModified\":\"2021-07-12T06:38:03+00:00\",\"description\":\"IoT devices can be extremely vulnerable to cyberattacks due to security issues. What can users do to protect themselves? &#x2705\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/all-the-surprising-and-scary-ways-you-and-your-systems-can-be-hacked\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/all-the-surprising-and-scary-ways-you-and-your-systems-can-be-hacked\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/all-the-surprising-and-scary-ways-you-and-your-systems-can-be-hacked\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/shutterstock_1064084909.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/shutterstock_1064084909.jpg\",\"width\":800,\"height\":526,\"caption\":\"Person holding smartphone with hologram of world map\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/all-the-surprising-and-scary-ways-you-and-your-systems-can-be-hacked\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/keynotespreker-trendwatcher-en-futurist\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"All the surprising and scary ways you (and your systems) can be hacked\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#website\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/\",\"name\":\"Richard van Hooijdonk Blog\",\"description\":\"Keynote speaker, trendwatcher and futurist\",\"publisher\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#organization\",\"name\":\"Richard van Hooijdonk BV\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/logo-footer-1.png\",\"contentUrl\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/logo-footer-1.png\",\"width\":100,\"height\":72,\"caption\":\"Richard van Hooijdonk BV\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#\\\/schema\\\/person\\\/cd9351ef31c33ebb6dd4efd845fe2b37\",\"name\":\"Hein\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g\",\"caption\":\"Hein\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"All the surprising and scary ways you (and your systems) can be hacked - Richard van Hooijdonk Blog","description":"IoT devices can be extremely vulnerable to cyberattacks due to security issues. What can users do to protect themselves? &#x2705","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.richardvanhooijdonk.com\/en\/all-the-surprising-and-scary-ways-you-and-your-systems-can-be-hacked\/","og_locale":"en_US","og_type":"article","og_title":"All the surprising and scary ways you (and your systems) can be hacked - Richard van Hooijdonk Blog","og_description":"IoT devices can be extremely vulnerable to cyberattacks due to security issues. What can users do to protect themselves? &#x2705","og_url":"https:\/\/blog.richardvanhooijdonk.com\/en\/all-the-surprising-and-scary-ways-you-and-your-systems-can-be-hacked\/","og_site_name":"Richard van Hooijdonk Blog","article_published_time":"2018-11-01T22:00:00+00:00","article_modified_time":"2021-07-12T06:38:03+00:00","og_image":[{"width":800,"height":526,"url":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/shutterstock_1064084909.jpg","type":"image\/jpeg"}],"author":"Hein","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Hein","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/all-the-surprising-and-scary-ways-you-and-your-systems-can-be-hacked\/#article","isPartOf":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/all-the-surprising-and-scary-ways-you-and-your-systems-can-be-hacked\/"},"author":{"name":"Hein","@id":"https:\/\/blog.richardvanhooijdonk.com\/#\/schema\/person\/cd9351ef31c33ebb6dd4efd845fe2b37"},"headline":"All the surprising and scary ways you (and your systems) can be hacked","datePublished":"2018-11-01T22:00:00+00:00","dateModified":"2021-07-12T06:38:03+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/all-the-surprising-and-scary-ways-you-and-your-systems-can-be-hacked\/"},"wordCount":1412,"publisher":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/#organization"},"image":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/all-the-surprising-and-scary-ways-you-and-your-systems-can-be-hacked\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/shutterstock_1064084909.jpg","keywords":["cybercrime","future"],"articleSection":["Cybercrime"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/all-the-surprising-and-scary-ways-you-and-your-systems-can-be-hacked\/","url":"https:\/\/blog.richardvanhooijdonk.com\/en\/all-the-surprising-and-scary-ways-you-and-your-systems-can-be-hacked\/","name":"All the surprising and scary ways you (and your systems) can be hacked - Richard van Hooijdonk Blog","isPartOf":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/all-the-surprising-and-scary-ways-you-and-your-systems-can-be-hacked\/#primaryimage"},"image":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/all-the-surprising-and-scary-ways-you-and-your-systems-can-be-hacked\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/shutterstock_1064084909.jpg","datePublished":"2018-11-01T22:00:00+00:00","dateModified":"2021-07-12T06:38:03+00:00","description":"IoT devices can be extremely vulnerable to cyberattacks due to security issues. What can users do to protect themselves? &#x2705","breadcrumb":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/all-the-surprising-and-scary-ways-you-and-your-systems-can-be-hacked\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.richardvanhooijdonk.com\/en\/all-the-surprising-and-scary-ways-you-and-your-systems-can-be-hacked\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/all-the-surprising-and-scary-ways-you-and-your-systems-can-be-hacked\/#primaryimage","url":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/shutterstock_1064084909.jpg","contentUrl":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/shutterstock_1064084909.jpg","width":800,"height":526,"caption":"Person holding smartphone with hologram of world map"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/all-the-surprising-and-scary-ways-you-and-your-systems-can-be-hacked\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.richardvanhooijdonk.com\/en\/keynotespreker-trendwatcher-en-futurist\/"},{"@type":"ListItem","position":2,"name":"All the surprising and scary ways you (and your systems) can be hacked"}]},{"@type":"WebSite","@id":"https:\/\/blog.richardvanhooijdonk.com\/#website","url":"https:\/\/blog.richardvanhooijdonk.com\/","name":"Richard van Hooijdonk Blog","description":"Keynote speaker, trendwatcher and futurist","publisher":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.richardvanhooijdonk.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.richardvanhooijdonk.com\/#organization","name":"Richard van Hooijdonk BV","url":"https:\/\/blog.richardvanhooijdonk.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.richardvanhooijdonk.com\/#\/schema\/logo\/image\/","url":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/04\/logo-footer-1.png","contentUrl":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/04\/logo-footer-1.png","width":100,"height":72,"caption":"Richard van Hooijdonk BV"},"image":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/blog.richardvanhooijdonk.com\/#\/schema\/person\/cd9351ef31c33ebb6dd4efd845fe2b37","name":"Hein","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g","caption":"Hein"}}]}},"_links":{"self":[{"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/posts\/58018","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/comments?post=58018"}],"version-history":[{"count":0,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/posts\/58018\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/media\/50657"}],"wp:attachment":[{"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/media?parent=58018"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/categories?post=58018"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/tags?post=58018"},{"taxonomy":"article-type","embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/article-type?post=58018"},{"taxonomy":"trends","embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/trends?post=58018"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}