Standing in front of a light bulb, Edmund Smith explained how a cyber attack could commandeer the switch.
With a “smart” light that isn’t properly secured, an attacker could capture data that’s coming from a set frequency, and later replay it back. That could allow them to assume control for on, off or dim controls, he said.
It’s just one example of a potential security threat that comes along with the Internet of Things, which connects devices to the internet. By digging into how the attack happens, Smith and other Morgan State University engineering students are looking to find ways to prevent the breaches from happening to the devices when they are deployed in the world.
READ FULL ARTICLE HERE