Security on the Web has become a global concern and has crept into the agenda of all the leaders of the planet. The proliferation of connected devices has multiplied the doors of attacks. So much so that The Government of Japan, through the National Institute of Information Technology and Communication, plans this month to hack 200 million devices to investigate the most vulnerable routes before the next Olympic Games. Switzerland offers rewards for to hack its electronic voting system in order to detect security breaches. One of the targets that most concerns are connected vehicles, smart cities, flight systems and new forms of shared mobility.
In contrast to the old models, the new cars have a 40% programming. "A current car has 100 million lines of code: seven times more than a plane," Andreas Herzig, of Global Lead Automotive, warned in the latest edition of Cybertech in Tel Aviv (Israel).
This security expert points out several forms of attack: espionage, data theft, spam, involuntary manipulation of the vehicle and interruption of services.
Faced with this vulnerability, it is committed to establishing a regulation for the new generation of cars, including protection systems and having guarantees of updating throughout the life of the vehicle. "In the future, each car will have a digital identity," says Herzig to individualize each device and establish mechanisms to monitor and control them.
This same concern extends to more sectors, especially with the upcoming incorporation of the fifth generation of mobile telephony (5G), on whose weak points it has already warned a group of European researchers. The multiplication of connected devices increases the risk of theft and sabotage. This includes from areas as sensitive as the regulation of air traffic and in smart cities to the security in the contracts of vehicles of shared mobility or even in medical devices.
The signature Zimperium demonstrated last Tuesday how could you, with a simple mobile, remotely and via Bluetooth, block a scooter from Xiaomi, modify its parameters or even maximize its speed.
Kfir Nissan, general director of Valid Network, a company specialized in the application of security systems through the chain of blocks (blockchain), affirms that the protection will be "crucial in sectors such as automotive, energy or commerce". "It's about creating a safe environment. 100,000 vulnerabilities are detected while 300,000 smart contracts are signed every day, "he warns.
Spain shares the concern. "Risks and threats will continue to grow exponentially in the coming years, which could damage the economic system and affect the welfare of our citizens," the president of the association of Spanish defense, security, aeronautics and space companies Tedae has warned. Jaime de Rábago, in the second days organized by this entity and held recently.
Official hacks and Swiss rewards
Japan has taken a step forward in prevention and, before the next Olympic Games, has authorized the hack official 200 million devices to analyze their vulnerabilities. The owners of those in which gaps are detected, who will not reveal their identities, will be informed and will receive suggestions to improve security. The reason is that the Japanese National Institute of Information Technology and Communication detected that the Internet of Things was the target of 54% of the attacks registered in 2017.
For its part, the Swiss Government has invited to register on the website of Public Intrusion Test
to try to hack "legally" the electronic voting system. The Executive offers 50,000 Swiss francs (44,000 euros) to whoever obtains it and demonstrates a vulnerability of the system.