Attacking home networks

What approaches are cybercriminals using to attack people’s home networks?

“You don’t have to sit in front of the house for an extended period of time.”

Professor Marco Gercke, the founder of the CyberCrime Research Institute, talks to Jeremy Swinfen Green about how criminals are targeting home workers.

Marco Gercke will be speaking at the inaugural teissBenelux2020 cyber security summit, taking place online from 27 to 29 October 2020. For free registration and more information, click here.

Video transcript:

How are they attacking people’s home networks? Are they sitting outside in cars and scanning for passwords or something like that? What are actually doing?

So there are various approaches. You can do it remotely. You can also, if you’re trying to attack the wireless access point, that’s something where you could drive by. You don’t necessarily have to sit in front of the house for an extended period of time. But what you want to have is the ability to get access there. Sometimes it’s also possible to access those wireless access points remotely through the internet, so that you’re not actually using the Wi-Fi access point, but the connection to the internet. There is sometimes a possibility for remote services and things like this, where they can access it, and then have access to all the devices. Sometimes it’s enough to drive by, get access to the network, instal the malware, and just leave the scene again. That’s sufficient for them to get remote access at a later stage.

Copyright Lyonsdown Limited 2021

Top Articles

Is your security in need of an update this Cybersecurity Awareness month?

Cyber security experts tell teiss about the evolving threat landscape and how organisations can bolster their cyber security defenses

A new case for end-to-end encryption

How a hacker group got hold of calling records and text messages deploying highly sophisticated tools that show signs of originating in China

Telcos in Europe put muscle behind firewalls as SMS grows

Messaging is set to be one of the biggest traffic sources for telcos worldwide prompting them to protect loss of revenue to Grey Route practices 

Related Articles

[s2Member-Login login_redirect=”” /]