Friday's internet attack demonstrates the importance of HomeKit

Last Friday many suffered the consequences of a massive attack on many internet services that caused Spotify, Twitter, WhatsApp and many websites to be inaccessible. Although the attack was aimed at the United States, the consequences could be seen all over the world, and for the first time devices were used that until now had no role in these cyber attacks: the internet of things. The security of these devices and the protocols they use to connect to the internet was questioned, and that is where Apple takes the opportunity to breastfeed and prove that HomeKit, its protocol for the internet of things, is safe Despite the criticism received as usual for his efforts to always create "enclosed gardens" with their own protocols.

What do these small devices that we have at home and that connect to the internet have to do? How can a thermostat, a smart bulb or a television recorder be to blame for a massive internet attack? Because most use connection protocols with very low security, sometimes even null, that are easily decrypted by hackers and that allow them to use them for their attacks. A DDoS attack like the one carried out last Friday requires thousands of computers sending requests to the same server to end up collapsing it. Hackers use users' computers that have been accessed through some type of malware installed on them, and thus become part of their network to use them in those attacks.

elgato-eve-accessories-compatible-homekit "width =" 830 "height =" 436 "srcset =" -homekit.jpg 830w, 300w, /wp-content/uploads/2015/06/elgato-eve-accesorios-compatibles-homekit-768x403.jpg 768w, accessories-compatible-homekit-320x168.jpg 320w, 400w, https: // 500w "sizes =" (max-width: 830px) 100vw, 830px "src =" https: // "data-sizes =" auto "class =" aligncenter size-full wp-image-9143 0 lazyload "/></p>
<p>But what if instead of having to install malware on other users' computers it was easier to access a baby surveillance camera or television recorders that are connected to the internet? That is precisely what happened last Friday. <strong>Many of these devices have access data of the type "admin / admin" and users do not change them when configured</strong>, either because you can't or because they don't. Some even changing this access data are still easily accessible remotely for a knowledgeable hacker.</p>
<div class='code-block code-block-3' style='margin: 8px auto; text-align: center; display: block; clear: both;'>

.ai-rotate {position: relative;}
.ai-rotate-hidden {visibility: hidden;}
.ai-rotate-hidden-2 {position: absolute; top: 0; left: 0; width: 100%; height: 100%;}
.ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback, .ai-list-block, .ai-list-block-ip, .ai-list-block-filter {visibility: hidden; position: absolute; width: 50%; height: 1px; top: -1000px; z-index: -9999; margin: 0px!important;}
.ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback {min-width: 1px;}
<div class='ai-rotate ai-unprocessed ai-timed-rotation ai-3-1' data-info='WyIzLTEiLDJd' style='position: relative;'>
<div class='ai-rotate-option' style='visibility: hidden;' data-index=

What is different on Apple-certified HomeKit devices? Its features include full encryption from one end to the other, protected wireless chips, protected remote access and other security measures that guarantee that they cannot be used for these attacks, or for any other. The problem with this situation generated by these devices connected with such poor security is that If not even your own users are aware that they are a threat to everyone's security, the solution is complicated.

The best accessories for your iPhone

Are you looking for a new case for your iPhone? An accessory for the Apple Watch? Maybe a Bluetooth speaker? Do not miss these offers on accessories and get the most out of Apple's mobile: