axbom’s avataraxbom’s Twitter Archive—№ 32,848

          1. When we see these hacks happen with coffee makers we can’t dismiss them with “it’s only a coffee maker”. We must apply futurist thinking and consider that similar vulnerabilities apply to schools, hospitals and power plants… arstechnica.com/information-technology/2020/09/how-a-hacker-turned-a-250-coffee-maker-into-ransom-machine/
        1. …in reply to @axbom
      1. …in reply to @axbom
        Ukraine has famously been a testing ground for power station hacks. vice.com/en_us/article/bmvkn4/ukrainian-power-station-hacking-december-2016-report
    1. …in reply to @axbom
      But Russian hackers have won remote access to the control rooms of many US power suppliers as well. bbc.com/news/technology-44937787
  1. …in reply to @axbom
    What really worries me is that a lot of equipment that is hacked, we simply don’t know about. Some “backdoors” are just left open to be accessed when needed. healthcareitnews.com/news/when-medical-devices-get-hacked-hospitals-often-dont-know-it
    1. …in reply to @axbom
      And you know how easy some of these “hacks" are?! It’s often about “antiquated, legacy systems with hardcoded passwords that can be found with a simple Google search”. The same reason there are laws passed against default passwords in WiFi routers. techcrunch.com/2018/10/05/california-passes-law-that-bans-default-passwords-in-connected-devices/
      1. …in reply to @axbom
        The fact of the matter is, nobody knows how far-reaching or how big the problem is. But experts agree that what we have seen as of yet is the tip of an iceberg. Only imagination allows us to visualise what is below the surface. nytimes.com/2018/10/11/opinion/internet-hacking-cybersecurity-iot.html
        oh my god twitter doesn’t include alt text from images in their API
        1. …in reply to @axbom
          The new Israeli series Tehran begins with the remote hacking of a commercial airline. It’s brilliant as it is timely, but also because so few people understand this vulnerability to even think of it. Machines break down. We’re used to it. We’re not used to the human intent.
          oh my god twitter doesn’t include alt text from images in their API
          1. …in reply to @axbom