{"id":2691,"date":"2014-01-10T11:30:06","date_gmt":"2014-01-10T16:30:06","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=2672"},"modified":"2020-02-26T18:58:05","modified_gmt":"2020-02-26T14:58:05","slug":"a-brief-overview-of-security-and-privacy-at-ces","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/a-brief-overview-of-security-and-privacy-at-ces\/2691\/","title":{"rendered":"A Brief Overview of Security and Privacy at CES"},"content":{"rendered":"<p>Full disclosure: we didn\u2019t send anyone out to the Consumer Electronic Show (CES) in Las Vegas this year. If you aren\u2019t familiar with it, CES is essentially a yearly showcase of all the latest and greatest technological innovations and products. While we didn\u2019t ship anyone off to attend the press- and industry-only event in person, we\u2019ve kept a close watch on it from home.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/01\/05111023\/ces-1.jpeg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-3433 aligncenter\" alt=\"ces\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/01\/05111023\/ces-1.jpeg\" width=\"640\" height=\"480\"><\/a><\/p>\n<p>From what we\u2019ve read, and this should come as no surprise, <a href=\"https:\/\/www.kaspersky.com\/blog\/securing-the-internet-of-things\/\" target=\"_blank\" rel=\"noopener nofollow\">the internet of things<\/a> is about to expand wildly with a rash of new wearables and otherwise connected devices. Unfortunately for the people that buy and use these things, they don\u2019t seem to be coming out of the box \u00e2\u20ac\u201d so-to-speak \u2013 with a whole lot of privacy and security controls.<\/p>\n<p>The variety of electronics unveiled thus far this week ranges from data-collecting smart appliances like refrigerators and ovens <a href=\"http:\/\/www.bbc.co.uk\/news\/technology-25662006\" target=\"_blank\" rel=\"noopener nofollow\">to Bluetooth enabled food thermometers<\/a> to wireless alarm systems and lighting controls to Skype-connected baby monitors to an Android tablet developed by the automobile manufacturer Audi for use as a Wi-Fi-capable display in its vehicles.<\/p>\n<p>The products debuted at CES this year aren\u2019t really surprising at all. The event is merely showcasing the advancement of a long-established trend in the tech industry aimed at connecting and collecting data from everything we use. However, some of this stuff is at least a little alarming considering everything<a href=\"https:\/\/threatpost.com\/2013-what-weve-learned\/103442\" target=\"_blank\" rel=\"noopener nofollow\"> we learned this year<\/a> about<a href=\"https:\/\/www.kaspersky.com\/blog\/car-hacking\/\" target=\"_blank\" rel=\"noopener nofollow\"> hackable cars<\/a>, <a href=\"https:\/\/www.kaspersky.com\/blog\/hacking-humans\/\" target=\"_blank\" rel=\"noopener nofollow\">humans<\/a>, and <a href=\"https:\/\/www.kaspersky.com\/blog\/black-hat-security-conference\/\" target=\"_blank\" rel=\"noopener nofollow\">other consumer devices<\/a> (<a href=\"https:\/\/www.kaspersky.com\/blog\/hacking-toilets\/\" target=\"_blank\" rel=\"noopener nofollow\">toilets?<\/a>)\u00e2\u20ac\u201d not to mention increases in malware targeting Android devices and vulnerabilities on that platform.<\/p>\n<div class=\"pullquote\">Some of this stuff is at least a little alarming considering everything we learned this year about hackable cars, humans, and other consumer devices (toilets?)<\/div>\n<p>It\u2019s also a bit surprising, considering the increasingly public reality of government surveillance and the grandstanding reaction of the tech giants to these surveillance programs, that tech companies are driving forward with new, more invasive products. Furthermore, given the public outrage that has resulted from the NSA spying revelations, it\u2019s just as surprising that consumers are lining up to buy this stuff.<\/p>\n<p>Chris McKie, the director of corporate communications at the security firm Fortinet, <a href=\"http:\/\/blog.fortinet.com\/CES-and-Security\/\" target=\"_blank\" rel=\"noopener nofollow\">noted in a blogpost recently<\/a> that \u2018Big Data\u2019 was about to become \u2018Supermassive Data.\u2019<\/p>\n<p>He goes on to write that with massive data collection comes massive risks in an environment in which data is often the preferred currency among criminals.<\/p>\n<p>\u00e2\u20ac\u0153Some weaknesses may be trivial \u2013 yes, you\u00e2\u20ac\u2122re hacked \u00e2\u20ac\u0153smart toaster\u00e2\u20ac\u009d might burn your toast,\u00e2\u20ac\u009d McKie writes. \u00e2\u20ac\u0153Other threats, such as a hacked connected car, could be life-threatening. This is not a question of whether these new, smart devices will be hacked and exposed. It\u00e2\u20ac\u2122s a question of how will we, as an industry, mitigate the risks associated with all these connected devices.\u00e2\u20ac\u009d<\/p>\n<p>What can we as consumers do about it though? Well, we can buy nothing new and move to some remote area outside the Internet\u2019s sinewy reach. But I personally like the Internet, and, frankly, I think some of the stuff unveiled at CES is pretty cool (I\u2019m looking at you<a href=\"http:\/\/ces.cnet.com\/8301-35284_1-57616868\/switch-he-said-t-mobile-will-take-the-penalty-for-you\/\" target=\"_blank\" rel=\"noopener nofollow\"> T-Mobile<\/a>). So I think the best option is to just do your homework. Reward the tech companies that give you a robust set of security and privacy feature and avoid those that don\u2019t give you a choice in the matter.<\/p>\n<p>Also, keep an eye on the blog as we start heading to conferences in the Winter, Spring, and Summer where hackers and researchers will undoubtedly break these new devices in every way imaginable.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Full disclosure: we didn\u2019t send anyone out to the Consumer Electronic Show (CES) in Las Vegas this year. If you aren\u2019t familiar with it, CES is essentially a yearly showcase<\/p>\n","protected":false},"author":1,"featured_media":2673,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,1485],"tags":[282,190,271,445],"class_list":{"0":"post-2691","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-special-projects","9":"tag-cybersecurity","10":"tag-device-protection","11":"tag-infographic","12":"tag-security-news"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/a-brief-overview-of-security-and-privacy-at-ces\/2691\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/a-brief-overview-of-security-and-privacy-at-ces\/2799\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/a-brief-overview-of-security-and-privacy-at-ces\/2320\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/cybersecurity\/","name":"Cybersecurity"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2691","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=2691"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2691\/revisions"}],"predecessor-version":[{"id":15689,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2691\/revisions\/15689"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/2673"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=2691"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=2691"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=2691"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}