Don't lose your safety with flying smart hardware!

Smart bracelets, smart cars, smart homes... Following the Internet era, emerging smart devices are rapidly driving the spread of smart living. Is it really safe to bring convenience to life while the Internet of Everything is connected? At the first HackPWN Safe Geek Carnival held recently, dozens of “white hat” hackers and hundreds of security geeks from home and abroad demonstrated the vulnerability mining and cracking technology of intelligent hardware and explored intelligent security issues, proposing the era of intelligence. The issue of security protection needs to be highly concerned.

In recent years, the Internet of Everything has become a global development trend. Forecasts from research institutions such as Gartner and McKinsey show that in 2015, there will be 4.9 billion devices connected to the Internet worldwide, and more than 26 billion devices will be connected in 2020. Everything will bring the global economy to the global economy every year. Up to 3.9 trillion to 11.1 trillion US dollars of influence.

At the same time as the rapid development of the Internet of Everything, the security issues behind it are increasingly emerging. At the World Black Hat Conference and the World Hacking Conference in early August this year, smart devices, including automobiles, were exposed to mass security vulnerabilities. Hackers used security holes to control cars, traffic traffic lights, and even sniper rifle bullet launches.

HP's application security department has conducted security reviews on 10 IoT devices such as TVs, webcams, thermostats, sprinklers, door locks, and weight scales. These devices have 250 different levels of security holes. The industry believes that once there are security vulnerabilities in billions of Internet-connected devices, it could have a serious impact.

When homes, cars, etc. are intelligent, these devices become fragile, and smart hardware seems to be easily turned into "fool" hardware in the hands of hackers. Carnival, millet bracelet, Tesla, BYD, Mercedes-Benz and other smart cars, ovens, smart TVs and other smart devices were on-site domestic and foreign hackers and from the car network security company, Pangu team, security consulting company COSEINC, Zhejiang University Many domestic security research teams such as Beijing University of Posts and Telecommunications have cracked one by one. Through the wireless network, the soya-bean milk machine can be started and stopped at will, the data of the smart bracelet can be changed and read at will, the GPS data can be forged to make the positioning "drift", and the O2O software vulnerability can be used to easily enjoy the "0 yuan rental car" and "0 yuan nail art". 0 yuan meal"...

"These smart devices that can be connected to the Internet can make people's lives more convenient, but security vulnerabilities may bring great harm to users." Huang Yuan, a female white hat hacker who cracked the soybean milk machine on the spot, said that hackers can use the security vulnerabilities to control the network at will. Smart devices not only involve personal privacy, payment security, but also personal safety, such as the occurrence of fires caused by smart home products.

Huang Lin, senior wireless security researcher in the Information Security Department of 360 Internet Security Center, pointed out that the current development of IoT products is still “function first”, while neglecting security issues or insufficient security design capabilities, product vendors should develop securely and ensure security from the source. On the other hand, some intelligent hardware is over-innovated and “avant-garde”, and there is a “frozen concept” phenomenon. The industry should truly design smart products based on user needs.

According to industry insiders, most of the smart device manufacturers in China do not have a special security response mechanism, and the vulnerability response rate is slow. In the face of a huge and complex world of interconnected objects, it is difficult for security companies and security industries to completely solve security problems. Security vendors need to work closely with industry chain related vendors such as intelligent hardware and Internet service platforms to solve problems. At the same time, it is also necessary to strengthen the public's safety awareness and protect personal privacy and personal and property safety.

Don't lose your safety with flying smart hardware!

Rotary Switch

Rotary Switches

The Rotary Switches, different with Key Switches, Metal Switches, Toggle Switches and Automotive Switches, is mainly installed on liquid and gas pipelines to regulate the flow and pressure of liquids and gases. When used, turn the handle to drive the adjusting nut to rotate, and connect the left-hand thread of the valve through the left-hand thread. Drive the valve to move right or left to change the cross-sectional area of the right hole passage in the valve body cavity, so as to adjust the liquid and gas in the upper outlet pipe.


Rotary Switches


The Electrical Rotary Switch is a switch that controls the opening and closing of the main contact by rotating the handle.There are two types of rotary switches, namely a unipolar unit structure and a multi-pole multi-position structure. Unipolar unit rotary switches are often used in conjunction with rotary potentiometers in applications, while multi-pole multi-position rotary switches are often used for switching of operating line.

Multi Position Rotary Switch, because of its use, the overall use of sealed structure, there is a certain degree of waterproof effect, the basic can reach the IP67 waterproof level.At the same time need to use a more rigid and durable metal material, there are two or three files in the gear difference.


Electrical Rotary Switch

Rotary Switches,Rotary Switch 4 Position,Rotary Switch Types,Rotary Potentiometer Switch

YESWITCH ELECTRONICS CO., LTD. , https://www.yeswitches.com

This entry was posted in on