Accendo Reliability

Your Reliability Engineering Professional Development Site

  • Home
  • About
    • Contributors
    • About Us
    • Colophon
    • Survey
  • Reliability.fm
  • Articles
    • CRE Preparation Notes
    • NoMTBF
    • on Leadership & Career
      • Advanced Engineering Culture
      • ASQR&R
      • Engineering Leadership
      • Managing in the 2000s
      • Product Development and Process Improvement
    • on Maintenance Reliability
      • Aasan Asset Management
      • AI & Predictive Maintenance
      • Asset Management in the Mining Industry
      • CMMS and Maintenance Management
      • CMMS and Reliability
      • Conscious Asset
      • EAM & CMMS
      • Everyday RCM
      • History of Maintenance Management
      • Life Cycle Asset Management
      • Maintenance and Reliability
      • Maintenance Management
      • Plant Maintenance
      • Process Plant Reliability Engineering
      • RCM Blitz®
      • ReliabilityXperience
      • Rob’s Reliability Project
      • The Intelligent Transformer Blog
      • The People Side of Maintenance
      • The Reliability Mindset
    • on Product Reliability
      • Accelerated Reliability
      • Achieving the Benefits of Reliability
      • Apex Ridge
      • Field Reliability Data Analysis
      • Metals Engineering and Product Reliability
      • Musings on Reliability and Maintenance Topics
      • Product Validation
      • Reliability by Design
      • Reliability Competence
      • Reliability Engineering Insights
      • Reliability in Emerging Technology
      • Reliability Knowledge
    • on Risk & Safety
      • CERM® Risk Insights
      • Equipment Risk and Reliability in Downhole Applications
      • Operational Risk Process Safety
    • on Systems Thinking
      • Communicating with FINESSE
      • The RCA
    • on Tools & Techniques
      • Big Data & Analytics
      • Experimental Design for NPD
      • Innovative Thinking in Reliability and Durability
      • Inside and Beyond HALT
      • Inside FMEA
      • Institute of Quality & Reliability
      • Integral Concepts
      • Learning from Failures
      • Progress in Field Reliability?
      • R for Engineering
      • Reliability Engineering Using Python
      • Reliability Reflections
      • Statistical Methods for Failure-Time Data
      • Testing 1 2 3
      • The Manufacturing Academy
  • eBooks
  • Resources
    • Accendo Authors
    • FMEA Resources
    • Glossary
    • Feed Forward Publications
    • Openings
    • Books
    • Webinar Sources
    • Podcasts
  • Courses
    • Your Courses
    • Live Courses
      • Introduction to Reliability Engineering & Accelerated Testings Course Landing Page
      • Advanced Accelerated Testing Course Landing Page
    • Integral Concepts Courses
      • Reliability Analysis Methods Course Landing Page
      • Applied Reliability Analysis Course Landing Page
      • Statistics, Hypothesis Testing, & Regression Modeling Course Landing Page
      • Measurement System Assessment Course Landing Page
      • SPC & Process Capability Course Landing Page
      • Design of Experiments Course Landing Page
    • The Manufacturing Academy Courses
      • An Introduction to Reliability Engineering
      • Reliability Engineering Statistics
      • An Introduction to Quality Engineering
      • Quality Engineering Statistics
      • FMEA in Practice
      • Process Capability Analysis course
      • Root Cause Analysis and the 8D Corrective Action Process course
      • Return on Investment online course
    • Industrial Metallurgist Courses
    • FMEA courses Powered by The Luminous Group
    • Foundations of RCM online course
    • Reliability Engineering for Heavy Industry
    • How to be an Online Student
    • Quondam Courses
  • Calendar
    • Call for Papers Listing
    • Upcoming Webinars
    • Webinar Calendar
  • Login
    • Member Home
  • Barringer Process Reliability Introduction Course Landing Page
  • Upcoming Live Events
You are here: Home / Articles / Beware the Walls May Be Listening and the Appliances Are Loose

by Greg Hutchins Leave a Comment

Beware the Walls May Be Listening and the Appliances Are Loose

Beware the Walls May Be Listening and the Appliances Are Loose

Guest Post by Ed Perkins (first posted on CERM ® RISK INSIGHTS – reposted here with permission)

Unsuspecting consumers, thinking they have found a bargain, or that they have joined the latest gadget trend, or both, can be unpleasantly surprised, according to recent revelations on how mobile and IoT (Internet of Things) devices can have built-in security issues.

Here is a recap of some if the issues found in consumer gadgets:

Smart TVs: A recent news report that Samsung “smart” TVs can listen to conversations in the room[1]. This became hot news during that week. Samsung published a “clarification” on its website[2].

The following language in Samsung’s privacy policy has led to confusion:

“Please be aware that if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party through your use of Voice Recognition.”

Samsung Smart TVs that offer voice recognition search functions have a microphone in the remote control which captures what is said (ex: “Recommend a good Sci-Fi movie”) and sends it to a server for processing. The server is hosted by a third party. So potentially, if you have this function enabled, the remote could be listening to sounds in the room and transmitting this to the server.

Wireless Doorbell: Researchers in the UK discovered that a smart doorbell can be made to reveal the wireless password for the homeowner [3]. The doorbell is only secured to its back plate by two standard screws. An attacker can gain access to the homeowner’s wireless network by unscrewing the unit, pressing the setup button and accessing the configuration URL. Once they have the password, they put the back on and there is no indication there was any tampering. A firmware update was released that fixes this issue, two week after it was reported to the company.

Wireless Home Alarm: A security consultant discovered that a wireless home alarm used unencrypted communications, so an attacker can listen to the signal and pick up the PIN from messages [4]. Once they have the password, when the owner is away they can shut off the alarm and burglarize the home. To make matters worse, the units are not fixable, since the electronics has a one-time programmable chip so the only recourse is to remove it and purchase a new alarm for a different vendor with hopefully a more secure design.

Cheap Tablets: In the midst of the 2014 Christmas shopping season, a security form reviewed the inherent security of some of the cheap Android tablets being sold by the big name retailers, and found “most of the devices ship with vulnerabilities and security misconfigurations; a few even include security backdoors”. Unsuspecting consumers who purchase these cheap tablets are likely inviting risks of mobile data & passwords theft [5].

Wireless Mouse Jacking: This week it was reported that most wireless mice and keyboards use unencrypted signals to connect to the USB receiver [6]. Thus is it is possible for someone up to 100 yards away to send commands into your computer (“mouse jacking”). While it may be difficult to physically get into position to attempt this, a determined hacker can easily spoof the mouse or keyboard to send signals into the computer. Some devices use Bluetooth, so it could be possible for someone to infect a Smartphone to be used to propagate the attack on the owner’s computer. Or if your computer is in located near a window.

The lesson here, is that once again buyer must be aware – but with technology items, how can the average consumer be aware if there are hidden risks? Do we need a ‘good housekeeping seal’ for cyber devices?

References

[1] Your Samsung SmartTV Is Spying on You, Basically

http://www.thedailybeast.com/articles/2015/02/05/your-samsung-smarttv-is-spying-on-you-basically.html

[2] Samsung Smart TVs Do Not Monitor Living Room Conversations

https://news.samsung.com/global/samsung-smart-tvs-do-not-monitor-living-room-conversations

[3] Steal your Wi-Fi key from your doorbell? IoT WTF!

https://www.pentestpartners.com/blog/steal-your-wi-fi-key-from-your-doorbell-iot-wtf/

[4] Using SimpliSafe Home Security? — You’re Screwed! It’s Easy to Hack & Can’t be Patched

http://thehackernews.com/2016/02/hack-home-security-alarm.html

[5] Santa or the Grinch: Android Tablet Analysis for the 2014 Holiday Season

https://bluebox.com/santa-or-the-grinch-android-tablet-analysis-2014/ – link no longer valid

[6] Countless computers vulnerable to MouseJack attack through wireless mice and keyboards

https://www.csoonline.com/article/554873/countless-computers-vulnerable-to-mousejack-attack-through-wireless-mice-and-keyboards.html

 

Filed Under: Articles, CERM® Risk Insights, on Risk & Safety

About Greg Hutchins

Greg Hutchins PE CERM is the evangelist of Future of Quality: Risk®. He has been involved in quality since 1985 when he set up the first quality program in North America based on Mil Q 9858 for the natural gas industry. Mil Q became ISO 9001 in 1987

He is the author of more than 30 books. ISO 31000: ERM is the best-selling and highest-rated ISO risk book on Amazon (4.8 stars). Value Added Auditing (4th edition) is the first ISO risk-based auditing book.

« Tolerance Specifications Impact on Reliability
Failure Analysis of a Gearbox, Fan, Bearing and Shaft »

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

CERM® Risk Insights series Article by Greg Hutchins, Editor and noted guest authors

Join Accendo

Receive information and updates about articles and many other resources offered by Accendo Reliability by becoming a member.

It’s free and only takes a minute.

Join Today

Recent Articles

  • Today’s Gremlin – It’ll never work here
  • How a Mission Statement Drives Behavioral Change in Organizations
  • Gremlins today
  • The Power of Vision in Leadership and Organizational Success
  • 3 Types of MTBF Stories

© 2025 FMS Reliability · Privacy Policy · Terms of Service · Cookies Policy