{"id":58109,"date":"2019-05-02T00:00:00","date_gmt":"2019-05-01T22:00:00","guid":{"rendered":"https:\/\/richardvanhooijdonk.com\/blog\/smart-homes-and-buildings-are-a-new-battlefield-for-hackers-and-security-experts\/"},"modified":"2024-12-19T22:12:23","modified_gmt":"2024-12-19T20:12:23","slug":"smart-homes-and-buildings-are-a-new-battlefield-for-hackers-and-security-experts","status":"publish","type":"post","link":"https:\/\/blog.richardvanhooijdonk.com\/en\/smart-homes-and-buildings-are-a-new-battlefield-for-hackers-and-security-experts\/","title":{"rendered":"Smart homes and buildings are a new battlefield for hackers and security experts"},"content":{"rendered":"<ul class=\"bold-list\">\n<li>The scope of the \u2018siegeware\u2019 threat<\/li>\n<li>Creating powerful malware isn\u2019t as expensive as it may seem<\/li>\n<li>A hacker hijacked Nest devices in a family home<\/li>\n<li>Exfiltrating data through a fish tank and modem routers<\/li>\n<li>Google hacked by its own employee<\/li>\n<li>Hospital data breach left 1.5 million patients exposed<\/li>\n<li>How to outsmart hackers and protect the system<\/li>\n<li>Every connected device is a potential threat<\/li>\n<\/ul>\n<p>Most people wouldn\u2019t consider their heating, ventilation, and air conditioning (HVAC) system as a prized target for <a href=\"https:\/\/blog.richardvanhooijdonk.com\/en\/blog\/iot-security-nightmare-experts-worried-worried\/\">cyber criminals<\/a>. After all, a successful hacking attempt could go as far as making us uncomfortable for a few minutes until we fix the problem. This wishful thinking, however, is what hackers are counting on. As we deploy a growing number of connected devices such as smart HVACs, intelligent cameras, and smart doorbells in our homes and offices, the complexity of the Internet of Things (IoT) ecosystem increases. Gartner, a research and advisory company, <a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2018-11-07-gartner-identifies-top-10-strategic-iot-technologies-and-trends\">predicts<\/a> that 25 billion connected devices will be in use by 2021. And many of these IoT devices will interact with each other through house automation servers like FHEM (Freundliche Hausautomatisierung und Energie-Messung) and Home Assistant, making our lives more comfortable, but less secure.<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-66829\" src=\"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/sites\/4\/2019\/05\/The-growth-of-IOT-market-300x96.png\" alt=\"\" width=\"800\" height=\"256\" srcset=\"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/The-growth-of-IOT-market-300x96.png 300w, https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/The-growth-of-IOT-market-768x246.png 768w, https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/The-growth-of-IOT-market-1024x328.png 1024w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>Sure, having tech that automatically turns on the air conditioner and lights as people enter the room is convenient, but building automation systems (BAS) that integrate connected \u2018things\u2019 are <a href=\"https:\/\/www.techradar.com\/news\/smart-building-complexity-is-creating-dangerous-new-hacking-opportunities\">often<\/a> inadequately secured and configured. Hackers easily breach them by, for instance, finding a weak spot in an unprotected web login page of a fire detection system. Once inside, hackers move to take over other parts of the BAS as well and can shut down the alarm or heating systems and demand ransom payment. This threat, also known as \u2018siegeware\u2019, is growing in severity, and many companies and individuals have already fallen victim to these attacks.<\/p>\n<h2>The scope of the \u2018siegeware\u2019 threat<\/h2>\n<p>According to ForeScout, a cybersecurity firm, the number of vulnerabilities in automation systems is constantly <a href=\"https:\/\/inbuildingtech.com\/smart-buildings\/cyber-attack-smart-building-iot\/\">increasing<\/a>. Hospitals and schools are particularly unprotected from cyber-attacks, and they operate as much as 8,000 highly vulnerable devices. And taking full control of these devices can have major consequences.<\/p>\n<p>ForeScout explains that control over smart devices can eventually provide hackers with access to private financial files and information stored in data centres. Also, they can listen to conversations, review camera streams, delete files, reprogram automation rules, distribute malware, and provide unauthorised individuals with physical access to the building. And although many of the vulnerabilities that hackers exploit are well known, only <a href=\"https:\/\/www.wespeakiot.com\/cyber-attacks-new-dangers-for-iiot-and-smart-buildings\/\">about<\/a> half of them in industrial and IoT systems have been patched. What\u2019s worse, even hackers with limited resources can develop effective malware and hack <a href=\"https:\/\/blog.richardvanhooijdonk.com\/en\/blog\/smartest-greenest-building-earth-edge-like-computer-roof\/\">smart buildings<\/a>.<\/p>\n<h2>Creating powerful malware isn\u2019t as expensive as it may seem<\/h2>\n<p>For instance, it <a href=\"https:\/\/www.securityweek.com\/researchers-create-poc-malware-hacking-smart-buildings\">took<\/a> ForeScout only $12,000 to develop proof-of-concept malware to show how easy it is to hack a smart building. In that process, the security experts first spent some time analysing various automation systems and looking for weak spots. They initially found eight vulnerabilities and opted to exploit two, both of which were already known to the vendor. In the next stage, they <a href=\"https:\/\/www.securityweek.com\/researchers-create-poc-malware-hacking-smart-buildings\">wrote<\/a> the code in the Golang programming language \u201cwith the final payload developed in Java\u201d. The file size was only two megabytes and could easily run on devices with limited capacity.<\/p>\n<figure id=\"attachment_62813\" aria-describedby=\"caption-attachment-62813\" style=\"width: 400px\" class=\"wp-caption alignright\"><img decoding=\"async\" class=\"wp-image-62813\" src=\"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/sites\/4\/2019\/05\/3-6-300x184.png\" alt=\"An infographic showing the cost of creating malware that can infect smart buildings\" width=\"400\" height=\"245\" srcset=\"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/3-6-300x184.png 300w, https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/3-6-768x470.png 768w, https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/3-6-1024x627.png 1024w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><figcaption id=\"caption-attachment-62813\" class=\"wp-caption-text\">The security firm ForeScout demonstrated that creating malware that can infect smart buildings can cost as little as $12,000.<\/figcaption><\/figure>\n<p>They then deployed the malware to exploit vulnerabilities in IP cameras and gain a foothold in the network. After that, the malicious code moved through various parts of the system, allowing the attacker to infiltrate the central database, add new users, and grant them the privilege of physical access to the building. ForeScout researchers were also able to delete files and disrupt BAS operations, while the malware could survive a reboot of the system and remove traces of infiltration by editing log files. Once the test was completed, the company <a href=\"https:\/\/www.securityweek.com\/researchers-create-poc-malware-hacking-smart-buildings\">noted<\/a> that \u201cwe are confident that this is well within the reach of many groups of actors with less positive intentions than ours.\u201d<\/p>\n<h2>A hacker hijacked Nest devices in a family home<\/h2>\n<p>Arjun and Jessica Sud from Lake Barrington, a village in the US state of Illinois, certainly agree with ForeScout, as they were victims of a malicious cyber criminal. He <a href=\"https:\/\/www.chicagotribune.com\/business\/ct-biz-nest-cameras-hacked-20190204-story.html\">hacked<\/a> their Nest cameras, speakers, and thermostat, and, at first, talked to their 7-month-old baby. As Arjun grabbed the kid and went downstairs, he noted that the temperature, which was usually set to around 22\u00b0C, was turned up to 32\u00b0C. A deep male voice then yelled at him through the speaker in a security camera, using racial insults and cursing. And as soon as the voice stopped screaming, Arjun and Jessica unplugged 17 Nest devices worth $4,000 and returned them to Google\u2019s company.<\/p>\n<p>Nest <a href=\"https:\/\/www.chicagotribune.com\/business\/ct-biz-nest-cameras-hacked-20190204-story.html\">says<\/a> that situations like this happen because of reused passwords. It suggests everyone to make use of a two-factor verification system and regularly update the software. Christian Vezina, the chief information security officer at the mobile security company OneSpan, <a href=\"https:\/\/www.chicagotribune.com\/business\/ct-biz-nest-cameras-hacked-20190204-story.html\">points out<\/a> that smart home devices \u201care being manufactured at a crazy rate, yet they\u2019re not being secured\u201d. And the ramifications can be catastrophic, as hackers could learn people\u2019s most intimate secrets and use them for blackmailing and other nefarious goals. The same danger is lurking in corporate offices equipped with connected devices, making it urgent to implement strict security protocols.<\/p>\n<h2>Exfiltrating data through a fish tank and modem routers<\/h2>\n<p>But despite all the security measures in place, creative hackers are sometimes able to overcome any obstacle. In Las Vegas, for instance, they hacked a casino through a high-tech fish tank that was connected to the internet. The malware extracted ten gigabytes of data and transferred it to a remote server in Finland. The full scope of the breach was spotted only after the staff called in experts from Darktrace, a cyber-defence company, to analyse suspicious activity. Darktrace <a href=\"https:\/\/www.forbes.com\/sites\/leemathews\/2017\/07\/27\/criminals-hacked-a-fish-tank-to-steal-data-from-a-casino\/#f377a9d32b96\">says<\/a> that \u201cthis was a clear case of data exfiltration but far more subtle than typical attempts at data theft.\u201d This, however, isn\u2019t the only way hackers exploit the vulnerabilities of connected ecosystems.<\/p>\n<p>For instance, hackers in Brazil <a href=\"https:\/\/blog.radware.com\/security\/2018\/08\/iot-hackers-trick-brazilian-bank-customers\/\">tried<\/a> to steal people\u2019s bank credentials by exploiting IoT devices. In one such example, cyber criminals hijacked DLink DSL modem routers and redirected all users that wanted to visit the website of Banco de Brasil to a fake website. The attack was highly sophisticated in the sense that the hijacking succeeded without editing URLs in the victim\u2019s browser. Also, the malicious code works on both Apple and Android phones and tablets. The victims then enter their username and password, believing they\u2019re accessing online banking accounts, while in reality, they&#8217;re delivering sensitive data to hackers.<\/p>\n<h2>Google hacked by its own employee<\/h2>\n<p>Even big tech companies aren\u2019t immune to security flaws in IoT devices. Google\u2019s engineer David Tomaschik, for example, <a href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2018\/09\/03\/googles-doors-hacked-wide-open-by-own-employee\/#224822343c7a\">found<\/a> a way to control smart locks used in the company\u2019s Sunnyvale offices by replicating the encryption key and forging commands in the office controller software made by the tech firm Software House. Even without the required RFID keycard, Tomaschik managed to open or lock the door and prevent people from entering the facility. And he could do all of this without leaving any digital traces behind.<\/p>\n<figure id=\"attachment_42321\" aria-describedby=\"caption-attachment-42321\" style=\"width: 800px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" class=\"wp-image-42321 size-full\" src=\"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/sites\/4\/2019\/05\/shutterstock_1339280195.jpg\" alt=\"\" width=\"800\" height=\"526\"><figcaption id=\"caption-attachment-42321\" class=\"wp-caption-text\">Even without the required RFID keycard, Tomaschik managed to open or lock the door and prevent people from entering the facility.<\/figcaption><\/figure>\n<p>Google moved swiftly to segment its network and shield the vulnerable code from possible outside interference. As for Software House, the company claims it\u2019s now using a more sophisticated form of encryption known as TLS. But the existing hardware and smart lock systems at customer sites aren\u2019t powerful enough to run the new software, which means that multiple companies throughout the world are vulnerable to cyber-attacks. Hackers can enable people to enter the premises of these companies, and, for instance, steal information or plant malware using infected USBs.<\/p>\n<h2>Hospital data breach left 1.5 million patients exposed<\/h2>\n<p>Meanwhile, cyber criminals <a href=\"https:\/\/govinsider.asia\/innovation\/singapore-healthcare-system-hack-singhealth-csa-moh\/\">stole<\/a> the personal data of 1.5 million patients in Singapore, including their names, gender, identity card numbers, and addresses. They stole even the prescription data of Prime Minister Lee Hsien Loong. The attack took place between 27 June and 4 July 2018, as the hackers breached the network of SingHealth, Singapore\u2019s largest group of healthcare institutions. Luckily, records such as diagnoses or test results weren&#8217;t tampered with, but the authorities paused many of the country\u2019s Smart Nation initiatives because of the attack.<\/p>\n<p>And many people fear that hackers could misuse their identities, as ID numbers are crucial for accessing various government services in Singapore. Leonard Kleinman, the senior director of IT Security for the Australian Tax Office and cybersecurity advisor to the security company RSA, <a href=\"https:\/\/web.archive.org\/web\/20181125210531\/https:\/\/www.enterpriseinnovation.net\/article\/singhealth-cyber-attack-what-are-concerns-1613622914\">says<\/a> that \u201csuch data can fetch a high price\u201d. In 2017, a stolen or lost healthcare record was worth as much as $408 on the Dark Web.<\/p>\n<h2>How to outsmart hackers and protect the system<\/h2>\n<p>As a growing number of cyber-attacks target IoT devices and automation platforms, companies and individual users should do their utmost to deny hackers a chance to inflict damage. Executing some basic security measures can yield great results. For instance, replacing default passwords with strong and unique credentials is critical, and so is regularly updating device software. And when buying new devices, it\u2019s important to check their security features to ensure that you can easily maintain them.<\/p>\n<p><a href=\"https:\/\/richardvanhooijdonk.com\/e-books\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-17787\" src=\"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/sites\/4\/2019\/05\/ebooks_en.png\" alt=\"Free e-books for 13 sectors\" width=\"760\" height=\"415\"><\/a><\/p>\n<p>Ian Heritage, an engineer at the cybersecurity firm Trend Micro, <a href=\"https:\/\/www.techradar.com\/news\/smart-building-complexity-is-creating-dangerous-new-hacking-opportunities\">suggests<\/a> that smart home and corporate buildings could benefit by \u201cenabling encryption for storage and communications, WPA2 for Wi-Fi routers, disabling UPnP and allowing only a hardcoded list of device MAC addresses to access the network.\u201d Furthermore, users should back up automation server configuration and prevent installations of suspicious applications. And by introducing multi-factor authentication and lockout on failed password attempts, BAS will enjoy significant protection and will be hard to breach even for a determined hacker. Most importantly, these measures will ensure that businesses know their IoT devices actually suffered a breach, as <a href=\"https:\/\/www.gemalto.com\/press\/pages\/almost-half-of-companies-still-can-t-detect-iot-device-breaches-reveals-gemalto-study.aspx\">only<\/a> 48 per cent of companies can spot such events.<\/p>\n<h2>Every connected device is a potential threat<\/h2>\n<p>As billions of IoT devices and sensors connect through automation platforms, they will create networks that are difficult to protect and are susceptible to software errors. Hackers will find it easier to infiltrate the system and steal sensitive data. Tackling siegeware is a priority, but success in that endeavour is far from guaranteed. There are multiple factors to consider. For instance, are law enforcement agencies ready to aggressively pursue these cases? Will victims pay the ransom? And just how many victims are hackers able to find?<\/p>\n<p>There are no definite answers to these questions, but perhaps the first and most important step is ensuring that people are aware of this threat. Hackers are unscrupulous and will go as far as to hack hospitals and risk the lives of patients. They\u2019re willing to steal personal information and use it to harm companies. With this in mind, people should improve their cyber protection and realise that any device that connects to the internet, whether a smart fridge or a smart doorbell, is a threat as much as it is a convenience. A new mindset might be the key to dealing with cyber criminals more effectively.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The scope of the \u2018siegeware\u2019 threat Creating powerful malware isn\u2019t as expensive as it may seem A hacker hijacked Nest devices in a family home Exfiltrating data through a fish tank and modem routers Google hacked by its own employee Hospital data breach left 1.5 million patients exposed How to outsmart hackers and protect the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":45972,"parent":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[2885],"tags":[4544,4543,4545],"article-type":[],"trends":[5464],"class_list":["post-58109","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybercrime","tag-cybertech-en-2","tag-hacking-en-2","tag-nest-en-2","trends-iot-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Smart homes and buildings are a new battlefield for hackers and security experts - Richard van Hooijdonk Blog<\/title>\n<meta name=\"description\" content=\"Smart buildings are plagued by lax security, and they&#039;re becoming an increasingly popular target for cyber criminals. &amp;#x2705\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.richardvanhooijdonk.com\/en\/smart-homes-and-buildings-are-a-new-battlefield-for-hackers-and-security-experts\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Smart homes and buildings are a new battlefield for hackers and security experts - Richard van Hooijdonk Blog\" \/>\n<meta property=\"og:description\" content=\"Smart buildings are plagued by lax security, and they&#039;re becoming an increasingly popular target for cyber criminals. &amp;#x2705\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.richardvanhooijdonk.com\/en\/smart-homes-and-buildings-are-a-new-battlefield-for-hackers-and-security-experts\/\" \/>\n<meta property=\"og:site_name\" content=\"Richard van Hooijdonk Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-01T22:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-19T20:12:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/shutterstock_1095422036.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"526\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Hein\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hein\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/smart-homes-and-buildings-are-a-new-battlefield-for-hackers-and-security-experts\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/smart-homes-and-buildings-are-a-new-battlefield-for-hackers-and-security-experts\\\/\"},\"author\":{\"name\":\"Hein\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#\\\/schema\\\/person\\\/cd9351ef31c33ebb6dd4efd845fe2b37\"},\"headline\":\"Smart homes and buildings are a new battlefield for hackers and security experts\",\"datePublished\":\"2019-05-01T22:00:00+00:00\",\"dateModified\":\"2024-12-19T20:12:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/smart-homes-and-buildings-are-a-new-battlefield-for-hackers-and-security-experts\\\/\"},\"wordCount\":1916,\"publisher\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/smart-homes-and-buildings-are-a-new-battlefield-for-hackers-and-security-experts\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/shutterstock_1095422036.jpg\",\"keywords\":[\"cybertech\",\"hacking\",\"nest\"],\"articleSection\":[\"Cybercrime\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/smart-homes-and-buildings-are-a-new-battlefield-for-hackers-and-security-experts\\\/\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/smart-homes-and-buildings-are-a-new-battlefield-for-hackers-and-security-experts\\\/\",\"name\":\"Smart homes and buildings are a new battlefield for hackers and security experts - Richard van Hooijdonk Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/smart-homes-and-buildings-are-a-new-battlefield-for-hackers-and-security-experts\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/smart-homes-and-buildings-are-a-new-battlefield-for-hackers-and-security-experts\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/shutterstock_1095422036.jpg\",\"datePublished\":\"2019-05-01T22:00:00+00:00\",\"dateModified\":\"2024-12-19T20:12:23+00:00\",\"description\":\"Smart buildings are plagued by lax security, and they're becoming an increasingly popular target for cyber criminals. &#x2705\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/smart-homes-and-buildings-are-a-new-battlefield-for-hackers-and-security-experts\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/smart-homes-and-buildings-are-a-new-battlefield-for-hackers-and-security-experts\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/smart-homes-and-buildings-are-a-new-battlefield-for-hackers-and-security-experts\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/shutterstock_1095422036.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/shutterstock_1095422036.jpg\",\"width\":800,\"height\":526},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/smart-homes-and-buildings-are-a-new-battlefield-for-hackers-and-security-experts\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/keynotespreker-trendwatcher-en-futurist\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Smart homes and buildings are a new battlefield for hackers and security experts\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#website\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/\",\"name\":\"Richard van Hooijdonk Blog\",\"description\":\"Keynote speaker, trendwatcher and futurist\",\"publisher\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#organization\",\"name\":\"Richard van Hooijdonk BV\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/logo-footer-1.png\",\"contentUrl\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/logo-footer-1.png\",\"width\":100,\"height\":72,\"caption\":\"Richard van Hooijdonk BV\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#\\\/schema\\\/person\\\/cd9351ef31c33ebb6dd4efd845fe2b37\",\"name\":\"Hein\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g\",\"caption\":\"Hein\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Smart homes and buildings are a new battlefield for hackers and security experts - Richard van Hooijdonk Blog","description":"Smart buildings are plagued by lax security, and they're becoming an increasingly popular target for cyber criminals. &#x2705","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.richardvanhooijdonk.com\/en\/smart-homes-and-buildings-are-a-new-battlefield-for-hackers-and-security-experts\/","og_locale":"en_US","og_type":"article","og_title":"Smart homes and buildings are a new battlefield for hackers and security experts - Richard van Hooijdonk Blog","og_description":"Smart buildings are plagued by lax security, and they're becoming an increasingly popular target for cyber criminals. &#x2705","og_url":"https:\/\/blog.richardvanhooijdonk.com\/en\/smart-homes-and-buildings-are-a-new-battlefield-for-hackers-and-security-experts\/","og_site_name":"Richard van Hooijdonk Blog","article_published_time":"2019-05-01T22:00:00+00:00","article_modified_time":"2024-12-19T20:12:23+00:00","og_image":[{"width":800,"height":526,"url":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/shutterstock_1095422036.jpg","type":"image\/jpeg"}],"author":"Hein","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Hein","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/smart-homes-and-buildings-are-a-new-battlefield-for-hackers-and-security-experts\/#article","isPartOf":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/smart-homes-and-buildings-are-a-new-battlefield-for-hackers-and-security-experts\/"},"author":{"name":"Hein","@id":"https:\/\/blog.richardvanhooijdonk.com\/#\/schema\/person\/cd9351ef31c33ebb6dd4efd845fe2b37"},"headline":"Smart homes and buildings are a new battlefield for hackers and security experts","datePublished":"2019-05-01T22:00:00+00:00","dateModified":"2024-12-19T20:12:23+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/smart-homes-and-buildings-are-a-new-battlefield-for-hackers-and-security-experts\/"},"wordCount":1916,"publisher":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/#organization"},"image":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/smart-homes-and-buildings-are-a-new-battlefield-for-hackers-and-security-experts\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/shutterstock_1095422036.jpg","keywords":["cybertech","hacking","nest"],"articleSection":["Cybercrime"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/smart-homes-and-buildings-are-a-new-battlefield-for-hackers-and-security-experts\/","url":"https:\/\/blog.richardvanhooijdonk.com\/en\/smart-homes-and-buildings-are-a-new-battlefield-for-hackers-and-security-experts\/","name":"Smart homes and buildings are a new battlefield for hackers and security experts - Richard van Hooijdonk Blog","isPartOf":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/smart-homes-and-buildings-are-a-new-battlefield-for-hackers-and-security-experts\/#primaryimage"},"image":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/smart-homes-and-buildings-are-a-new-battlefield-for-hackers-and-security-experts\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/shutterstock_1095422036.jpg","datePublished":"2019-05-01T22:00:00+00:00","dateModified":"2024-12-19T20:12:23+00:00","description":"Smart buildings are plagued by lax security, and they're becoming an increasingly popular target for cyber criminals. &#x2705","breadcrumb":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/smart-homes-and-buildings-are-a-new-battlefield-for-hackers-and-security-experts\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.richardvanhooijdonk.com\/en\/smart-homes-and-buildings-are-a-new-battlefield-for-hackers-and-security-experts\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/smart-homes-and-buildings-are-a-new-battlefield-for-hackers-and-security-experts\/#primaryimage","url":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/shutterstock_1095422036.jpg","contentUrl":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/shutterstock_1095422036.jpg","width":800,"height":526},{"@type":"BreadcrumbList","@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/smart-homes-and-buildings-are-a-new-battlefield-for-hackers-and-security-experts\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.richardvanhooijdonk.com\/en\/keynotespreker-trendwatcher-en-futurist\/"},{"@type":"ListItem","position":2,"name":"Smart homes and buildings are a new battlefield for hackers and security experts"}]},{"@type":"WebSite","@id":"https:\/\/blog.richardvanhooijdonk.com\/#website","url":"https:\/\/blog.richardvanhooijdonk.com\/","name":"Richard van Hooijdonk Blog","description":"Keynote speaker, trendwatcher and futurist","publisher":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.richardvanhooijdonk.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.richardvanhooijdonk.com\/#organization","name":"Richard van Hooijdonk BV","url":"https:\/\/blog.richardvanhooijdonk.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.richardvanhooijdonk.com\/#\/schema\/logo\/image\/","url":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/04\/logo-footer-1.png","contentUrl":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/04\/logo-footer-1.png","width":100,"height":72,"caption":"Richard van Hooijdonk BV"},"image":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/blog.richardvanhooijdonk.com\/#\/schema\/person\/cd9351ef31c33ebb6dd4efd845fe2b37","name":"Hein","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g","caption":"Hein"}}]}},"_links":{"self":[{"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/posts\/58109","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/comments?post=58109"}],"version-history":[{"count":0,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/posts\/58109\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/media\/45972"}],"wp:attachment":[{"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/media?parent=58109"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/categories?post=58109"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/tags?post=58109"},{"taxonomy":"article-type","embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/article-type?post=58109"},{"taxonomy":"trends","embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/trends?post=58109"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}