Feeds

Fridges to be hit by Net viruses

ILoveYou will turn your milk sour

  • alert
  • submit to reddit

The Power of One Infographic

Fridges and household appliances may be the future victims of PC-related bugs.

Russian anti-virus company Kaspersky Lab is warning that in a few years Internet-connected microwaves and freezers will be prime targets for virus creators.

Viruses could be designed to make your fridge door swing open in the middle of the night - only to be discovered the next morning, or your central heating come on in summer. In fact any device with a Web connection could become infected.

"The Internet is developing so quickly, that if you don't pay enough attention to security you face being attacked by viruses," said Ian Hale, UK MD of Kaspersky Lab. "As technology advances, so will the problems."

The company said the next phase of viruses would hit mobile phones and wireless platforms. The Russian outfit exposed the first mobile phone email virus earlier this month.

Eugene Kaspersky, head of anti-virus research at Kaspersky's labs in Moscow, said research was currently exploring anti-virus WAP software.

Codenamed Prague, he said the system, still in its very early stages, "allows us to easily move the applications of our software to other platforms - including mobiles phones and PDAs". Mobile phone viruses, like the worm version which spammed phones at random two weeks ago, are relatively new. They have not done any major damage - nowhere near the monster proportions seen by the recent ILoveYou virus - yet.

"As soon as virus presenters get access to development tools to develop these programmes - they will be able to target mobile phones," said Kaspersky.

"Anti-virus companies have to move software from PC platforms to mobile platforms."

A potential target for household appliance viruses emerged this week with the announcement of LG Electronics digital fridge. It has been developed to allow users to order groceries online. The "Internet Digital Dios Refrigerator" is due for release this month.

"Refrigerator will not be just a food-storing box," an LG representative told the Korea Herald. "It will serve as a communications and entertainment tool for housewives as they do kitchen work." ®

  • Yesterday the FBI said it had launched an investigation into an email virus said to have hit email systems at several major US companies. The "Stages of Life" worm, which masquerades as a text file, acts like the ILoveYou virus in that it forwards itself to everyone in the user's Outlook address book if the attachment is opened.

It poses as a humorous file, and appears with a subject which contains the words "funny", "life stages", or "jokes". ®

Mobile application security vulnerability report

More from The Register

next story
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.