Internet of things (IoT) has been defined as a global infrastructure for the information society,

What is Internet of Things?

Internet of things (IoT) has been defined as a global infrastructure for the information society, enabling advanced services by interconnecting (physical and virtual) devices and equipment based on the Internet.  All devices can communicate with each other anytime, anywhere over the Internet.

The wide application of IoT includes smart healthcare, smart home, smart living, environmental monitoring, energy management, intelligent transport system and etc.

In our daily lives, IoT devices include everything from routers, smart TVs, smart light bulbs, webcams, smart door locks, smart air-conditioners to our personal devices including laptops, smart phones, smart watches and handheld game consoles.

These smart devices collect data from the environment around them, such as location, time, temperature, brightness, humidity, heart rate or appearance.  They are connected to the Internet through telecommunications network (e.g. 4G or 5G mobile network) and by intelligent processing and analysis of big data, they can perform their smart functions on devices and appliances.

Risk of Using IoT

Let’s imagine:

If a hacker intrudes into your smart home devices and learns through IP cameras that you are out for work, and clandestinely unlocks your digital door lock, your home will then be exposed to the risk of burglaries.

If a hacker intrudes into an electric vehicle with automatic navigation connected to the Internet and interferes its driving automation, it may cause serious consequences.

These are not fictional plots. With the launching of new IoT devices, an abundance of user information and database have become a target for hackers.  Also, many IoT devices do not have any security setting or security system in place when manufactured. If users use the default passwords or enable unnecessary functions (such as File Transfer Protocol, Remote Desktop Services, etc.), such devices will be vulnerable to cyberattacks.


In addition, hackers may install malware to control IoT devices, which will become a member of the Botnet and initiate cyberattacks to other computers.

Security tips on IoT

You may be interested in

Non-fungible token (NFT) NFT is a new form of virtual asset investment. Common NFT includes digital image, audio-visual file and…

The “HTTP 404” or “Not Found” page is a standard response message of HTTP status code, and it is also…

Deepfake (a portmanteau of “deep learning” and “fake”) refers to a technique using deep learning (an artificial intelligence Deepfake 0…

Cookie is a file stored in your computer or mobile, allowing the server to identify your device. What is Cookie?…

Many websites and mobile applications would collect your personal information and preference to provide more personalised experience and services, also…

Welcome to subscribe

Please read our “Privacy Policy” carefully before filling out the form. For enquiries, please email to [email protected]

We, Cyber Defender, collect your personal information including name, gender, and contact information (e.g. telephone number(s) and email address) only for the latest information-sharing proposal

* Must declare

Sign up for web hosting today!

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Subscribe successfully.
Please check your email.