Well if Wikileaks (an award-winning organisation that publishes secret and classified information from anonymous sources) is to be believed, perhaps our fears are justified. Over the past ten years, it has built up a reputation for disclosing some of the biggest news stories, and has become a cautiously trusted source for some of the world’s leading media companies and newspapers. This latest disclosure alleged that the CIA did indeed exploit vulnerabilities in Apple and Google’s software to use smart TVs as transmitters by remotely enabling the television’s built-in microphone while it appears to be powered off. The dossier claimed that the CIA developed this and similar snooping techniques with other foreign agencies, including British Intelligence. It further alleged extensive infiltration of smartphones and hacking capabilities that “exceed mandated powers.” Even though the allegations made by Wikileaks were reported extensively by the British National and American Press, the response from governments on both sides of the Atlantic has been muted. In a subsequent press release, Samsung simply reiterated that they take consumer privacy and security very seriously.
Since the story broke, technical experts in the field of cyber security have come forward to say that the threat of the average person getting hacked is reasonably low providing they take precautions. Recommendations include following manufacturers' guidelines, and using complex passwords.
What the media failed to make clear in many cases is that, in order to carry out many of the hacks referred to in the report, would-be hackers would have needed physical access. If devices are correctly installed, it is unlikely that they will be accessed remotely and therefore successfully compromised by malicious hackers.
Privacy advocates, and manufacturers continue to make sure that end-users remain protected from cyber criminals and malicious surveillance. Their endeavour grows in importance as our lives become increasingly entwined with the IoT, but we too have a duty to remain vigilant in the same way that we take steps to protect our homes against physical intruders. Recommendations include purchasing high-quality products from reputable suppliers, following makers' instructions, and always using strong passwords. Also, using end-to-end encryption whenever possible, will also drastically reduce the attack surface, and as a result the likelihood of falling victim from snoopers and malicious hackers.