Herbert Gilbert got the first patent on a smoke-free cigarette that he described as a device that provided a harmless and safe smoking method. Over 60 years later, the iterations of the invention by Gilbert have raised a debate over the safety of electronic cigarettes. The popularity of electronic cigarettes has been increasing rapidly over recent years.
Some people have even argued that their use can help people quit smoking traditional cigarettes. Manufacturers have also marketed their electronic cigarettes as healthier alternatives to traditional smoking because their use does not involve combustion. Thus, no smoke is produced when a person uses these devices. As such, they can be used to eliminate the adverse effects of cigarette smoke on human health.
However, many people have doubted this argument following the revelation that a vape pen (https://vapingdaily.com/best-vape-pens/) can be used by hackers to access and hack computers. It is one of the latest modifications to the initial electronic cigarette. This device is compact and stylish. People are using modern electronic cigarettes, even in public places without being noticed. But, the revelation that the device that a person uses as a tool for quitting smoking can be used to steal essential data from their computer has sparked a heated debate in modern society.
How an E-Cig can be a Security Risk
Most vape pens are chargeable devices. Users can charge them through a USB cable or by plugging them directly into their computers’ USB ports. Using a charging cable to charge an electronic cigarette seems like an innocent act to most people.
However, security researchers have warned that though this act may seem innocent and straightforward, it can compromise a computer. A hacker needs to make a few simple tweaks to the device and use it to hack into a computer.
According to Ross Bevington, a security researcher, the concept entails the use of a vaping device to fool a computer to think that it is just a peripheral like a keyboard that is being used. It can also interfere with the network traffic of a computer. As such, a person may seem to use your computer to charge their vaping device, yet they are hacking into your device.
The Concept of Using an E-Cig to Hack a Computer
Mark James, an ESET security specialist, notes that hackers are continually looking for the next opportunity to present itself so that they can dupe unsuspecting individuals. Research has shown that the use and awareness of electronic cigarettes have grown exponentially over recent years. Currently, millions of people from all parts of the world are using electronic cigarettes.
The popularity of electronic cigarettes can partly be attributed to the fact that their manufacturers market them as less harmful smoking alternatives. However, hackers can take advantage of their popularity to hack into the computers of unsuspecting individuals.
People use USB dongles to charge vaping devices. As such, it’s relatively easy for hackers to include additional hardware into a charger to allow for communication with an endpoint device. Once this has been done, the machine can easily be compromised. Malware can also be downloaded directly to a computer.
A person with the best vape pen will mostly use their desktop or laptop to charge it. That means the device is already authenticated after logging in. As such, there are higher chances that malware can succeed in this state.
Adam Brown, a Security Solutions manager at Synopsys, notes that a research paper published by the University of Michigan and the University of Illinois showed that a hacker could drop a USB stick with malware on it deliberately. According to this paper, there is a 50% chance that the device would be picked by another person and plugged into another computer.
Research has shown that even the best vape pens can be modified and used as peripheral devices once plugged into a computer. As such, a vaping device can be used to deliver a platform or payload for malicious activities once plugged into a computer.
Potentially, a vaping device that a person gives away can end up being plugged into their computer when charging. Therefore, it can be used as a useful device by a hacker to target a specific computer or its owner.
Just like with other peripheral devices, vapers can protect themselves from the security risk that is associated with electronic cigarettes. According to Mark James, a vaper can take several precautionary measures to avoid being a victim of this form of attack. For instance, a vape can use a power adapter when charging vaping devices. They can also use their computers to charge the device when logged out only.