Quantcast
Channel: Recommended
Viewing all articles
Browse latest Browse all 35493

Top Comments: Do You Trust Your Monitor? Edition

$
0
0

Your monitor — yes, that’s right, your monitor — may be infected with a virus to spy on you, or worse. If you believe the latest alarm bells, that is.

But first, a word from our sponsor:

Here at Top Comments we strive to nourish community by rounding up some of the site's best, funniest, most mojo'd & most informative commentary, and we depend on your help!! If you see a comment by another Kossack that deserves wider recognition, please send it either totopcomments at gmail or to the Top Comments group mailbox by 9:30pm Eastern. Please please please include a few words about why you sent it in as well as your user name (even if you think we know it already :-)), so we can credit you with the find!

Tonight’s feature presentation: Do you trust your monitor?

An article posted yesterday at one of the sub-channels of vice.com warns us: Hackers Could Break Into Your Monitor To Spy on You and Manipulate Your Pixels.

Seriously? Computer monitors are now on the list of things that can be hacked, and/or infected by malware? Apparently. But how could something that we consider to be totally passive, get invaded by outside forces?

Essentially, if a hacker can get you to visit a malicious website or click on a phishing link, they can then target the monitor’s embedded computer, specifically its firmware. This is the computer that controls the menu to change brightness and other simple settings on the monitor.

The hacker can then put an implant there programmed to wait for further instructions. Then, the way the hacker can communicate with the implant is rather shrewd. The implant can be programmed to wait for commands sent over by a blinking pixel, which could be included in any video or a website. Essentially, that pixel is uploading code to the monitor. At that point, the hacker can mess with your monitor.

Many articles on infections over the internet are sketchy on the actual details; this article is particularly sketchy, leaving lots of unanswered questions. For example, does the vulnerability of your monitor depend on what operating system you are running? After all, for some remote website to communicate back and forth with your monitor, there needs to be a pathway for some kind of data, that your system allows to get through. Hardware, operating systems, and device drivers need to allow this happen.

The article lays out one possibility of how the vulnerability could be exploited: say in a power plant, the systems that display plant/network status could be hacked to show a visual that is a panic situation, causing the humans watching the screens to take some undesirable action for the wrong reason. Perhaps going so far as to shut down the plant. Still, that seems like a stretch.

Supposedly there are a billion vulnerable monitors in businesses and in homes, worldwide. Is yours one of them?

If you have a monitor, chances are your monitor is affected, ...

The word they used is affected, not infected. I’m going to conclude that yours and mine probably aren’t. Yet.

Monitors are just the latest on a long list of The Internet of Hackable Things.

If you have a smart thermostat, it can be locked with ransomware that demands payment before you can regain control of your heating and air conditioning system. Your printer might be bugged, to transmit your data over radio waves. Phillips Hue lightbulbs, connected to the internet, can be controlled from up to 400 meters away. Printers connected to the internet but not protected against connections from pretty much anywhere, were instructed to print out racist flyers. (Heinous stuff there, you have been warned). A GPS Tracker for Kids Had a Bug That Would Let Hackers Stalk Them. Some models of  wireless mouse and keyboard communicate to the computer via a dongle plugged into a USB port. A hacker can intercept the radio signal and replace it with their own, to take control of the computer. A Fisher-Price teddy bear has a camera in its nose, and has the potential to leak kids’ personal information over the internet. Owners of some Samsung smart refrigerators were startled that the calendar app no longer functioned on the fridge door, possibly because Google had deprecated or disabled the service. Other Samsung refrigerators allowed hackers to steal the owners’ Google credentials. Chrysler/Jeep vehicles seem particularly susceptible to hacking, enabling a key to be created using the vehicle’s VIN and a stolen VIN database. And hackers have demonstrated taking control of a moving vehicle, including shutting it down while being driven at highway speed. If you’re in Rio right now, just give up; you’re already screwed.

Some of these exploits are very real, varying in degrees of difficulty getting all the way down to trivial. Others are more theoretical, and require some hands-on tinkering to achieve. But Jeebus, a monitor? Give me a break.

Are you scared yet? Going off the grid? We’ll miss you!

Top comments for sunday august 7, 2016

From BeninSC:

I am trying to remember when I read a comment that touched me more than this one from first-time Daily Kos commenter, susanna pinto, on the real fight some have to make in our not-so-progressive-yet society, and on working to defeat Trump.

It’s in “Three Words That I Wish I’d Never Hear Democrats Say Again”, by Dartagnan.

top mojo for saturday august 6, 2016 1)  Although I agree with you that dkos shouldn't pu … by tecampbell  +159 2)  Not really… … by angry marmot  +153 3)  I also do it when I have a touch of heartburn … … by Barbara Morrill  +111 4)  Uh, no. Hillary should say nothing, of course an … by nocynicism  +109 5)  I have my list of 100 addresses in my precinct w … by Ken in Tex2  +107 5)  And I am not suggesting that we should push the … by tecampbell  +107 7)  She is fair game for any lies, breaking of laws … by Karl Rover  +104 7)  Abortion rates pre and post Roe v Wade are relat … by merrywidow  +104 9)  She has actually made herself part of the story. … by NedSparks  +88 9)  I put my hand on my heart often, when I’m moved, … by Diogenes2008  +88 11) Especially when the basis is you weren’t even bo … by leonard145b  +87 12) Birtherism is Racism! Melania Trump is not off l … by leonard145b  +85 13) I don’t know if this is true for anyone else, bu … by WarrenS  +84 14) I am so profoundly sorry for your loss. by plumbobb  +83 15) As I said in your previous diary, they hate wome … by Kane in CA  +80 15) Good, solid sex education will also help in redu … by elwior  +80 17) Joe taking the Oath of Office at 4 y/o Beau’s ho … by dmhlt 66  +79 17) For Georgia we will need a great African America … by Lava20  +79 17) Agreed. It’s also a slur against non-white peopl … by Marisela  +79 17) Great diary and great news. Thank you for writin … by KKC  +79 17) Yes … one pro-birther with whom I was engaging g … by fisknp  +79 22) ^This^ … by Catte Nappe  +77 22) Melania made the play for being a 'good immigran … by imokyrok  +77 24) I’m thinking we’re gonna see Obama make a few st … by Ken in Tex2  +76 25) Exactly right. It’s a complex stew of issues tha … by Blue Boy Red State  +75 26) Jill Stein is a fraud. … by Clive Dawson  +74 26) I’m not supporting the system. I’m standing up f … by Timaeus  +74 28) It looks as if whoever had four hours in the “Ho … by Had Enough Right Wing BS  +72 29) Dave G, I understand and share your frustration, … by CoyoteMarti  +71 29) just posted this in another thread. food for tho … by yankeedoodler  +71 29) I’m sure he sucked at the teleprompter on purpos … by denig  +71 top photos for saturday august 6, 2016

Permission to use this photo not granted.


Viewing all articles
Browse latest Browse all 35493

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>