Partner links

Security risks posed by smart meters

Smart Meter hacking security risk

In a world of always-on connectivity, Internet of Everything and Internet of Things, where most devices now have an embedded computer, the risk posed by hackers tampering with them cannot be overlooked.

I don’t have a smart meter at home, but in the near-future, most homes, including mine, will have one. That’s why I like to read and learn as much as I can about the security risks they pose.

And that’s why I’m linking to an article titled Smart Meter Attack Scenarios, written by Rainer Link, a Senior Threat Researcher at Trend Micro, a security outfit with global operations.

Here’s an excerpt

At their heart, a smart meter is simply… a computer. Let’s look at our existing computers – whether they are PCs, smartphones, tablets, or embedded devices. Similarly, these smart meters are communicating via understood technologies: cellular connectivity, power-line networking, or the user’s own Internet connection.

With that in mind, we have to consider the possible threats – what could happen if a smart meter is compromised? Similarly, what are the problems that could result if the connectivity of a smart meter is disrupted? Let us see.

Perhaps the most obvious risk is simple: meter tampering. If a smart meter can be hacked, inaccurate information can be sent back to the utility, allowing an attacker to adjust the reading and resulting in an inflated bill. Let’s say, for example, that you have an argument with your neighbor. In revenge, if he can access your smart meter, you might see a rather large electric bill.

You may read the complete article here.

Smart Meter hacking security risk
The above screenshot was taking from The Risk of Adopting a Smarter Energy Future video.

Share:

Facebook
Twitter
Pinterest
LinkedIn

Partner links

Newsletter: Subscribe for updates

Subscribe
Notify of
guest
2 Comments
Inline Feedbacks
View all comments
Lordon Giddy
Lordon Giddy
9 years ago

Smart meters are a real boon for burglars.

If the usage information can be retrieved from the smart meter or the utility company’s web site by cracking into the customer’s web account, it is very easy to see a pattern when there is minimal power consumption and therefore the time period when the property is most likely vacant.

And if the burglar alarm is internet connected as well, well it might be possible to crack that because of careless password protection.

Get the latest

On social media

Security distros

Hacker
Linux distros for hacking and pentesting

Crypto mining OS

Bitcoin
Distros for mining bitcoin and other cryptocurrencies

Crypto hardware

MSI GeForce GTX 1070
Installing Nvidia GTX 1070 GPU drivers on Ubuntu

Disk guide

LVM
Beginner's guide to disks & disk partitions in Linux

Bash guide

Bash shell terminal
How to set the PATH variable in Bash
Categories
Archives
2
0
Hya, what do you think? Please comment.x
()
x