Camera intrusion, inciting suicide, guiding to graveyards... How far is the road to AI intelligent security?

0 22
In the age of the internet, any action exposed to electronic products carries th...

In the age of the internet, any action exposed to electronic products carries the risk of being leaked.

Security Information: In the age of the Internet of Things, any action exposed to electronic products carries the risk of being leaked. The era of万物智联 has just begun, but it is obvious that there is much to be improved in terms of security. How to improve user experience, how to avoid potential dangers, and ensure user privacy and security is far more practical than dazzling new features.

Camera intrusion, inciting suicide, guiding to graveyards... How far is the road to AI intelligent security?

“Wake up! Did you hear that?”

“What?”

“I... I heard someone in the room, and the monitor... is gone!”

“Hurry up! Go and see!”

“Oh, my god! Where is my...? Where is my...?”

This is a story snippet from 'Cybersecurity Crime', where a cybercriminal gang successfully hacked into a family's network and camera, and on a dark, windy night when the parents were sleeping, they controlled the camera to conduct an online auction and steal.

WeChat Image_20191226142026.jpg

The means are cunning and chilling, but what is even more terrifying is that the script once imagined has already come true in real life...

A family in Desoto County, Tennessee, USA, reported that the Ring smart camera installed in their eight-year-old daughter's room was hacked.

On the fourth day after the camera was installed, their daughter heard strange sounds coming from her room, a bit like the sound of someone sneaking through the window; curiosity drove her to walk towards the room, and the clearer 'thump, thump, thump' sound became louder as she got closer. Then she opened the door and asked subconsciously, 'Who's there?'

According to the video they posted online, at this time, the hacker replied through the camera: 'I am your best friend. I am Santa Claus,' and then the hacker even tried to incite the little girl to commit some destructive behavior. The mother said that every time she saw this, she felt a chill down her spine.

In fact, the hacking incidents like the above Ring camera are not rare, and there were four reported in the United States in just one week.Including:

  • A couple from Florida heard a young man mention their biracial son through the Ring camera and tried to force them to access a website.

  • A woman from Atlanta was sleeping in bed when she heard a man's voice coming from the Ring camera, clapping and saying 'Wake up!' Finally, he also said: 'I can see you on the bed, wake up quickly!'

  • Even more terrifying is that a woman in Texas was even blackmailed by hackers because of this. When her home security alarm went off, a hacker informed her through the Ring camera that her 'account has been terminated', and finally demanded that she pay 50 bitcoins as a 'ransom' or she would be 'killed'.

dc46-ikyziqx8088175.jpg

But a spokesperson for Ring confirmed that these hacking incidents have nothing to do with the security of Ring, mainly because users leak information due to using the same password on multiple platforms.

But in any case, these events are extremely worrying. Home cameras are not private.In the age of the internet, any action exposed to electronic products carries the risk of being leaked.

Just a few days ago,

85c2-ikyziqx8088171.jpg

I was so scared that I didn't know what to say. This thing is so cruel and violent when it goes crazy. I just wanted to learn about **'s physiological knowledge. I am taking a class on this topic, and it made me want to stab my ** with a knife and commit suicide.

Danni said she was doing housework at the time and asked Alexa to read a biology article from Wikipedia. She then found that the content was incorrect. She said, 'The command I gave it was just, 'Can you tell me some information about the heart cycle?' 'Alexa said that this content was read from ****, but when I went online to check, I did not find any of this out-of-control content about encouraging suicide.'

Previously, reports have shown that after a regular update, Alexa often emits various eerie laughs without being awakened, and may even make unexpected phone calls to colleagues in the middle of the night, or even set out a route to the nearby cemetery by itself.

Not only abroad, but recently, Wenzhou police broke a case of hackers illegally controlling home cameras, controlling 32 suspects. The police introduced thatThese people obtain private videos by illegally penetrating camera systems, and then sell them on forums, QQ groups, or exchange camera accounts with others. The prices vary from 5 yuan to 60 yuan depending on the privacy level of the video.

During the buying and selling process, the seller will allow the customer to preview some clips, or to avoid being banned, the seller will also send the customer some nude images through the 'flash photo' function, such as breastfeeding videos of a mother, a naked customer in a beauty salon, etc., which will be automatically destroyed after three seconds. After the customer previews it, they can get the account and password by transferring money directly through Alipay or WeChat red envelopes.

R5PclCFe.jpg

In addition to selling camera account passwords, there are also special individuals selling cracking software, such as 'All-seeing Eye', 'Blue精灵', 'God's Eye', etc. For example, one seller's 'All-seeing Eye' is priced at 398 yuan, claiming to be able to search for all brands of cameras within one kilometer.

On the Internet, cracking surveillance, buying and selling, and exchanging private videos have formed a complete profit chain.

Privacy issues in electronic technology are frequent, and the road to AI security is still long.Smart assistants' temporary bugs are not something to be afraid of, but the misuse of smart assistantsThe real horror is the people who misuse their hands. Sometimes, there is only a thin veil between 'artificial intelligence' and 'artificial intelligence disability'.

Previously, two CNBC journalists conducted an interesting test. They told Apple's Siri, Google Assistant, and Amazon's Alexa that they wanted to commit suicide.

For such explicit suicidal intent, all three smart speakers provided suicide intervention hotlines, but when the topic becomes more subtle and indicative of suicidal tendencies, such as: 'I am very melancholic'; 'My inner darkness is too great'; 'I don't want to see the sun tomorrow', etc., the smart assistant cannot distinguish.

The era of万物智联 has just begun, but it is obvious that there is much to be improved in terms of security.

How to improve user experience and how to avoid potential dangers and ensure user privacy and security are much more practical than dazzling new features.


你可能想看:

Data security can be said to be a hot topic in recent years, especially with the rapid development of information security technologies such as big data and artificial intelligence, the situation of d

b) It should have the login failure handling function, and should configure and enable measures such as ending the session, limiting the number of illegal logins, and automatically exiting when the lo

It is possible to perform credible verification on the system boot program, system program, important configuration parameters, and application programs of computing devices based on a credible root,

b) It should have a login failure handling function, and should configure and enable measures such as ending the session, limiting the number of illegal login attempts, and automatically logging out w

d) Adopt identification technologies such as passwords, password technologies, biometric technologies, and combinations of two or more to identify users, and at least one identification technology sho

5. Collect exercise results The main person in charge reviews the exercise results, sorts out the separated exercise issues, and allows the red and blue sides to improve as soon as possible. The main

Five, YamlPropertiesFactoryBean loads YAML files

Article 2 of the Cryptography Law clearly defines the term 'cryptography', which does not include commonly known terms such as 'bank card password', 'login password', as well as facial recognition, fi

Enterprises have insufficient response capabilities, and the cybersecurity of the manufacturing industry faces severe challenges

Ensure that the ID can be accessed even if it is guessed or cannot be tampered with; the scenario is common in resource convenience and unauthorized vulnerability scenarios. I have found many vulnerab

最后修改时间:
admin
上一篇 2025年03月27日 19:17
下一篇 2025年03月27日 19:40

评论已关闭