Industry
PC & Mobile technology
Safety
08.02.2024 08:00

Share with others:

Share

Even toothbrushes can be a cyber hazard

Even toothbrushes can be a cyber hazard

Security experts have warned that millions of toothbrushes infected with viruses could be used in a large-scale cyber attack.

Internet-connected toothbrushes could be connected to a so-called botnet, allowing them to carry out a distributed denial-of-service (DDoS) attack that would overwhelm websites and servers with large amounts of web traffic.

According to Swiss newspaper Aargauer Zeitung, which first reported the threat, the attack could bring down major websites, resulting in millions of dollars in lost revenue. Many reported the hypothetical scenario as an actual attack on an unknown Swiss company, but Fortinet was quick to explain that it was only research and a warning about a possible future threat.

"The topic of using toothbrushes for DDoS attacks was brought up during the interview as an illustration of a specific type of attack and is not based on Fortinet or FortiGuard Labs research," the spokesperson said. "Translations seem to have stretched the narrative on this topic to the point where hypothetical and actual scenarios are blurred."

Fortinet also warns of the dangers of smart devices, which can include web cameras, video babysitters, doorbells and smart home appliances. "Any device that is connected to the Internet is a potential target - or can be misused for an attack," said Stefan Züger, head of systems technology at Switzerland-based Fortinet. Züger advised owners of smart technologies to take steps to protect themselves.

It's not hard to see that everyday smart devices are increasing risks. At this year's CES, we were presented with even more such devices, including a smart pillow, so it is quite understandable that in the future cyber miscreants will also focus on these devices.

The question is how we can protect ourselves and at the same time use smart everyday devices.


Interested in more from this topic?
information security cyber security online security


What are others reading?