Check Point has published a report identifying network security vulnerabilities with EZCast, an HDMI dongle-based TV streamer that converts non-connected TVs into smart TVs. The findings show a hacker’s ability to gain full…
Check Point has published a report identifying network security vulnerabilities with EZCast, an HDMI dongle-based TV streamer that converts non-connected TVs into smart TVs. The findings show a hacker’s ability to gain full, unauthorised access to an EZCast subscriber’s home network, enabling them to compromise personal information and take control of home devices.
EZCast has approximately 5 million users, runs on its own Wi-Fi network and is controlled through a smartphone or PC. The device represents a growing trend of connecting devices to the Internet – known as the Internet of Things (IoT) – and further introduces unique security challenges for both consumers and business. The Check Point research report highlights significant risks:
• Attackers can enter through the Wi-Fi system, allowing easy access into both the EZCast and home networks.
• Once in, the attackers can move around the networks undetected, providing the ability to view confidential information and infect home devices.
• The attacks can be initiated remotely; hackers can execute malicious code anywhere.
“This research provides a glimpse of what will be the new normal in 2016 and beyond – cyber criminals using creative ways to the exploit the cracks of a more connected world,” said Oded Vanunu, security research group manager, Check Point. “The Internet of Things trend will continue to grow, and it will be important for consumers and businesses to think about how to protect their smart devices and prepare for the wider adoption of IoT.”
The report is available from Check Point's security blog: blog.checkpoint.com
View more of the latest press releases from across the industry or post your company's news.