Internet of things (IoT) has been defined as a global infrastructure for the information society,

What is Internet of Things?

Internet of things (IoT) has been defined as a global infrastructure for the information society, enabling advanced services by interconnecting (physical and virtual) devices and equipment based on the Internet.  All devices can communicate with each other anytime, anywhere over the Internet.

The wide application of IoT includes smart healthcare, smart home, smart living, environmental monitoring, energy management, intelligent transport system and etc.

In our daily lives, IoT devices include everything from routers, smart TVs, smart light bulbs, webcams, smart door locks, smart air-conditioners to our personal devices including laptops, smart phones, smart watches and handheld game consoles.

These smart devices collect data from the environment around them, such as location, time, temperature, brightness, humidity, heart rate or appearance.  They are connected to the Internet through telecommunications network (e.g. 4G or 5G mobile network) and by intelligent processing and analysis of big data, they can perform their smart functions on devices and appliances.

Risk of Using IoT

Let’s imagine:

If a hacker intrudes into your smart home devices and learns through IP cameras that you are out for work, and clandestinely unlocks your digital door lock, your home will then be exposed to the risk of burglaries.

If a hacker intrudes into an electric vehicle with automatic navigation connected to the Internet and interferes its driving automation, it may cause serious consequences.

These are not fictional plots. With the launching of new IoT devices, an abundance of user information and database have become a target for hackers.  Also, many IoT devices do not have any security setting or security system in place when manufactured. If users use the default passwords or enable unnecessary functions (such as File Transfer Protocol, Remote Desktop Services, etc.), such devices will be vulnerable to cyberattacks.


In addition, hackers may install malware to control IoT devices, which will become a member of the Botnet and initiate cyberattacks to other computers.

Security tips on IoT

You may be interested in

The Internet reaches almost everywhere and contains massive source of information. How much information is accessible to the public? From…

In the digital age, teenagers have started to use the Internet since their childhood. Online content varies greatly. To what…

The concept of Metaverse originates from Snow Crash, a science fiction novel published in 1992 by an American writer, Neal…

NFT is a new form of virtual asset investment. Common NFT includes digital image, audio-visual file and video clip which…

The “HTTP 404” or “Not Found” page is a standard response message of HTTP status code, and it is also…

Welcome to subscribe

Please read our “Privacy Policy” carefully before filling out the form. For enquiries, please email to [email protected]

We, Cyber Defender, collect your personal information including name, gender, and contact information (e.g. telephone number(s) and email address) only for the latest information-sharing proposal

* Must declare

Sign up for web hosting today!

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Subscribe successfully.
Please check your email.