Attack of the refrigerators? The cyber-threats lurking in your home

Clayton, Mark
January 2014
Christian Science Monitor;1/22/2014, pN.PAG
It's been called the "Internet of Things" - a network of web-connected consumer appliances - and, just as the Internet you already know has opened up myriad opportunities for criminals, so too will this Internet of Things.


Related Articles

  • Tiny Creepy Creatures. Mueller, Marion // Library Media Connection;Mar/Apr2012, Vol. 30 Issue 5, p91 

    The article reviews the book series Tiny Creepy Creatures, including the books "Food Intruders: Invisible Creatures Lurking in Your Food," "Body Bugs: Invisible Creatures Lurking Inside You," and "Uninvited Guests: Invisible Creatures Lurking in Your Home."

  • Gut feeling: is the skinny [...].  // Daily Mail;1/26/2016, p21 

    Gut feeling: is the skinny bug lurking in YOUR tummy?

  • Smart fridge used in cyber attack.  // Telecom Asia;Feb/Mar2014, Vol. 25 Issue 1, p32 

    The article reports on the use of smart home appliances like refrigerators and home routers in cyber attacks, according to security firm Proofpoint.

  • Cyber-Attacks Are More Targeted and Sophisticated. Greengard, Samuel // Baseline;4/28/2015, p1 

    The article focuses on the increase in number of cyber-attacks and breaches, as reported in the "2015 Security Outlook: Meeting Today's Evolving Cyber-Threats" survey by performance marketing firm QuinStreet Enterprise. It discusses the problems-associated with cyber-attacks like corruption of...

  • What to Watchout for this Year in Security.  // PC Quest;Jan2015, p30 

    The article focuses on the predicted increase of cyberthreats by 2015, according to a report from cybersecurity research firm Websense Security Labs. Topics discussed include the predicted increase on data breaches in the healthcare industry, the attack on Internet of Things (IoT) focusing on...

  • Unseen Cyber-Threats. Crosman, Penny // Bank Technology News;May2012, Vol. 25 Issue 5, p10 

    The article reports on the increasing cyber-threats posed malicious wares to financial institutions in the U.S. According to security experts, there is an alarming increase in advanced persistent threats that have no known signature or pattern behavior. It states that these threats lurk in...

  • Behind this redbrick façade is a thoroughly up-to-date family home. Paul Kelly // Daily Mail;3/29/2014, p48 

    ASK anyone who has bought a redbrick period house and they'll say such homes can be a real curse in disguise. Behind the cornices and centre roses may lurk the kind of horrors that will eat away at your bank balance for years.

  • On Bike Safety, Backyard Noise, and Bacteria. Korman, Bob; Wilkins, Dottie; Taglia, Bill; Zollweg, Gary; Kane, Paul; Licitra, Annette; Huenemann, Paul; Phillips, Ron // Consumer Reports;Aug2015, Vol. 80 Issue 8, p5 

    Several letters to the editor are presented in response to articles in previous issues including "In the Privacy of Your Own Home" in the June 2015 issue, "Ask Congress for Safer Detergent Pods" in the June issue, and "Listeria Lurks: Protect Yourself" in the July issue.

  • Adopt a proactive approach. Saif, Irfan // SC Magazine: For IT Security Professionals (15476693);Dec2010, Vol. 21 Issue 12, p54 

    The author presents tips for security organizations on preventing attacks on information security. He suggests to adopt a risk-based method and to focus on business processes. He recommends to leverage technology and automation and to take into account cyberthreat management. He mentions that...

  • Are You Active on the Cyber-Threat Frontlines? Carr, Reo // San Diego Business Journal;10/13/2014, Vol. 35 Issue 41, p63 

    The author discusses the connection between the Ebola virus and cyber-threats, citing that the lack of executives of ways to fight against cyber-threats showed that they are opening their companies to attacks as potentially damaging to the corporate body as is Ebola to the human body.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics