Everything is becoming a thing connected to the internet, but some things really shouldn't be.
First cab off that rank should be input devices, because what sort of maniac thinks the advantages of a roaming cloud-based configuration outweighs the potential explosion in surface area to attack and compromise? That maniac is called Razer, and it has been connecting keyboards to its Synapse software for years.
At last week's CES, Razer took it a step further when it announced it is adding support for users to use Alexa to control their peripherals.
"Alexa, ask Chroma to change my lighting profile to FPS mode," Razer cheerily proclaims as an example of its upcoming functionality.
For this to work, the software that usually controls keyboard and mice settings needs to be connected to Amazon Alexa.
It's a 2-for-1 cloud connection, because once you embrace the idea of Razer's servers being secure, then you've already accepted a more risky proposition than using just Amazon.
Last month, Razer faced blowback when it launched a cryptocurrency mining application called Cortex, where users would be rewarded with its Silver funny money.
"The new app to put snoozing machines to work, solving blockchain puzzles in the background in exchange for sweet, sweet Silver," Razer said at the time.
Enter Tavis Ormandy, security researcher for Google Project Zero and scourge of buggy software makers, who took a look at the software and was stunned.
"Holy moly, I just installed this. WHY IS CEF (chromium embedded) REMOTE DEBUGGING ENABLED AND LISTENING BY DEFAULT (!?!?!?!)," Ormandy tweeted.
"I don't have any razer hardware to test, but they probably (like, *right now*) need to fix that."
To Razer's credit, the company fixed the issue within 24 hours; on the other hand, it allowed remote command execution in the first place.
Also in Razer's favour is that it acknowledged it was responsible, which is more than can be said for Gigabyte.
On December 18, SecureAuth detailed an exchange of when it discovered that software utilities for Gigabyte and Aorus motherboards had privilege escalation vulnerabilities.
"There is ring0 memcpy-like functionality ... allowing a local attacker to take complete control of the affected system," SecureAuth said.
In trying to resolve what was clearly a serious issue, the security company could not locate a proper contact within Gigabyte, and headed over to its technical support team.
"Gigabyte is a hardware company and they are not specialized in software," Gigabyte told SecureAuth on two different occasions in May.
In the end, SecureAuth said Gigabyte eventually responded by saying its products did not have any issues.
If a vendor with the experience and sales of Gigabyte responds by denying responsibility for its software, it doesn't bode well for smaller players.
Gigabyte should stop distributing software as long as it keeps on throwing out the excuse that it is a hardware company.
And it is no small matter, because the utilities that the Taiwanese manufacturer puts out are built to manipulate hardware settings, and flash BIOSes.
If a bad actor was looking for a shortcut into a modern Windows system, trying to find your way in via Microsoft's code will be time wasting when the camembert-like underbelly of a modern system is likely to be crap software from peripheral makers.
That tactic is not new, but with connectivity exploding, things are likely to get worse before it gets better, as with most things in the cyber realm.
ZDNET'S MONDAY MORNING OPENER:
The Monday Morning Opener is our opening salvo for the week in tech. Since we run a global site, this editorial publishes on Monday at 8:00am AEST in Sydney, Australia, which is 6:00pm Eastern Time on Sunday in the US. It is written by a member of ZDNet's global editorial board, which is comprised of our lead editors across Asia, Australia, Europe, and North America.
PREVIOUSLY ON MONDAY MORNING OPENER:
- CES 2019: 5G, AI, design and data collide
- 5 technologies you'll get sick of hearing about in 2019
- 2018 technology trends that will matter a decade from now
- The state of cyberwarfare: 2 things you need to know
- Why AWS re:Invent is arguably more important than Amazon's Black Friday, Cyber Monday bonanza
- Tech companies are dialling down the hype around 5G mobile - here's why
- Google needs to break up its all-or-nothing approach to permissions
- Data center automation: 2 acronyms you should know
- Freshworks aims to court SMBs, scale and deliver consultant free SaaS
- Telcos flailing against tide to turn into dumb pipes
- We're killing off passwords. But are we ready for what will replace them?
- Edge Computing: The 2 things tech leaders should know
- If being customer first is so important, why don't companies do it?
- The race to ruin the internet is upon us