by Anthony Cox on February 7th, 2013
The risk of viruses on PCs and laptops are understood by most, and such threats are, by and large, protected against by some very sophisticated software approaches. The threat to mobile devices is also now being taken seriously. But what about M2M modules? The word on the street is that during the Queen’s London Jubilee celebrations a hacker sent continuous messages to the M2M-enabled security cameras covering the event (known as pinging). This might have meant that on the day when security could not be more important, key security infrastructure was rendered useless. Thankfully security on that day was not put to the test.
However, it raises an important point. M2M modules are going into power stations, meters, vehicles – just about every kind of object imaginable, and it only takes one security breach to result in, well, who knows what? There is little evidence to date to suggest that M2M is being actively targeted by the hacker community, but as the service offering becomes more sophisticated and as more intelligence resides at the module level, the threat level will inevitably rise – and it looks like we may have had our first “attack”.
Of course M2M providers are not resting on their laurels. For top-tier M2M service providers and specialists, encryption is becoming an integral part of the M2M roll out, programming interfaces are protected by security software, and there is more and more talk of how security in the M2M environment is best addressed.
Older roll-outs, though, could still be vulnerable and hackers can be remarkably persistent and are likely to be looking for chinks in the armour. As with any area of internet security, it’s a question of remaining one step ahead, because more intelligence and sophistication inevitably correlates to increased vulnerability and risk.