This will happen to automobiles.Imagine a world where the humble plug socket is end of lifed.
Oh.
This will happen to automobiles.Imagine a world where the humble plug socket is end of lifed.
Oh.
Agree. I had some iPod touch (5th gen or 6th) that had support ended the day it stopped being for sale).You're VERY much over-stating Apple's support.
5 years from last sale is vintage. Almost all hardware and softare support stop. There have been a few instances of Apple issuing a critical software security update for non-current software but I think the longest backward support was two previous versions for an active zero-day exploit.
At 7 years the devices are considered obsolete and no have support from Apple for hardware or software. A recall is still possible, otherwise all issues are your own. Ex: the 1st Genn iPod Nano
Search Apple Support
support.apple.com
This is incorrect. If UPnP is enabled, then the Wemo V2 is vulnerable from the internet:this is an overreaction from what I read of the exploit.
Someone would need to be on your network for the plug to even hear, never mind operate on the "change your name" command.
A Vegas casino got hacked and had a bunch of money stolen from them because of a weakness in an internet-enabled fish tank thermometer. If they get into your network, it becomes much easier to move around it. You prob don’t have millions of dollars at risk, but you may have login/password details that could theoretically get lifted from a home computer.Yeah, they might switch your lamp on and off to annoy you![]()
A trend by All technology companies. End of life means end of everything.Yup. Belkin just lost my future business.
What a terrible policy/response.
👋
Does not take much computing power to snoop on one’s network. The plug could find a computer on the network. Same with a smart speaker, the snooping part.Yeah, they might switch your lamp on and off to annoy you![]()
Indeed, Apple should yank all Belkin products from their stores to send them a clear message.Belkin is buddy-buddy with Apple, and has stuff in Apple stores as well, kinda shocking imo
Only if you’re responsible for the locks on her doors OR responsible for an extremely weak Wi-Fi network setup (something like the name of the access point is “ThePasswordIsElderyMother”). Because that’s the only way anyone can get to the device.So if my bedridden elderly mother loses push button control of her portable air conditioner in her Dallas apartment on a 100-degree Summer day, her death is on me.
End of life, indeed.
Thanks, Belkin. Better hope you don’t get sued.
This is fairly low-level and difficult to exploit. The source article is a good read for those interested in C, assembly language, or buffer overflow attacks, but even as someone who majored in CS it was pretty hard for me to follow.
Manufacturers refusing to provide security updates is still a good reason to avoid smart home devices, as if we even needed another...
edit: Getting more of the gist of it on the second read, I enjoy very technical articles like this![]()
Note: While this wasn’t in the scope of our research, from what we have gathered, it appears that this vulnerability could be triggered via the Cloud interface (meaning, without a direct connection to the device).Only if you’re responsible for the locks on her doors OR responsible for an extremely weak Wi-Fi network setup (something like the name of the access point is “ThePasswordIsElderyMother”). Because that’s the only way anyone can get to the device.
This would be a useful hack to get people to think their house is haunted. Have a sound machine whisper "get out" occasionally to boost the effect.😁 Doubtful you would scare someone out of their home in today's housing market. "My house is haunted? I'm gonna find that ghost and make 'em pay rent."🤨Yeah, they might switch your lamp on and off to annoy you![]()
IMO they need something to back up this claim. The attack was carried out with direct commands to a device on the same network. A web-based configuration interface or API will have its own validation constraints in place.Note: While this wasn’t in the scope of our research, from what we have gathered, it appears that this vulnerability could be triggered via the Cloud interface (meaning, without a direct connection to the device).
This further highlights the need for the aforementioned steps, as the Wemo Cloud infrastructure could be used as a potential attack vector.
A friend of mine used to run around the neighbourhood with a universal TV remote and turn people's TV's off. (same sort of thing for electric garage door remotes)...Yeah, they might switch your lamp on and off to annoy you![]()
Well this makes me want to invest in smart stuff 🙄 Not.Actually, no. If you give any app on your phone permission to your network, then it could exploit your plug. The plug is connected to your WiFi. The exploit could overwrite the firmware to add extra functionality like sniffing your network constantly, issuing remote commands to your devices on your network. This is really far reaching and doesn’t just allow the attacker to control the plug. It gives them full access to your network and the devices on the network.