Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT/Embedded Security

8/2/2017
12:30 PM
Pawani Vaddi
Pawani Vaddi
News Analysis-Security Now
50%
50%

How Secure Are Your IoT Devices?

The IoT can be a huge attack surface: What are you doing to keep your smart devices free from stupid security faults?

In 1982, a modified Coca-Cola machine at Carnegie Mellon University became the first Internet-connected device. The vending machine could self-report its inventory and detect whether the newly loaded drinks were being kept cold. You've probably noticed: This type of technology is everywhere today. From fitness trackers to home security systems and smart kitchens, connectivity surrounds us. It's amazing how technology continues to evolve and transform our lives, increasing comfort and providing immense control over our daily routines.

A recent Gartner study says 8.4 billion connected things will be in use in 2017, and this number is estimated to reach over 20 billion by the year 2020. I believe we will continue to see a stunning variety of ordinary devices that are computerized and connected -- impacting how we work, play and live.

The Internet of things (IoT) is a dazzling industry where the possibilities seem endless. At the same time, we shouldn't let ourselves forget that these life-altering devices are, at their core, still computers. And for as long as computing devices have existed, there have also been ways to manipulate them for nefarious purposes. While it's true that the devices are getting smarter and more sophisticated, hackers and their tactics are advancing too. We must make a conscious effort to protect these devices and make sure we, as consumers, are safe in the connected world.


Get real-world answers to virtualization challenges from industry leaders. Join us for the NFV & Carrier SDN event in Denver. Register now for this exclusive opportunity to learn from and network with industry experts -- communications service providers get in free!

During development, the primary focus for IoT products has been to bring the greatest new technology to market. Unfortunately, this means IoT manufacturers aren't always diligent about implementing security at the manufacturing level. As a result, consumers are at risk.

Let's consider the destructive Mirai malware which made its notorious debut in 2016. Hackers targeted webcams and DVRs to enable a swarm of devices to create the botnet (a controlled network of computers infected with malicious software) which was then used to accomplish a distributed denial of service attack (DDoS). Webcams and DVRs are some of the forerunners in the IoT product realm, and weren't built with security in mind.

The IoT infrastructure, as it is stands today, is extremely vulnerable to attacks. As consumers, we must take precautions to keep ourselves and one another safe. Here are a few simple suggestions:

  • Change the default usernames and passwords on the devices immediately. You might be surprised at how many people skip this step, leaving the proverbial front door wide open for hackers.
  • Update to the latest firmware. Any time a device vulnerability is discovered, (reputable) companies push security patches to their customer base. It's very important to diligently update devices before the bad guys use a vulnerability as a gateway.
  • Consider using smart home WiFi solutions. Vendors such as Luma, Cujo and few others help scan home networks for potential malicious activity. Additionally, consumers should avoid connecting to public WiFi as much as possible. Instead, consider using secure WiFi (VPN) solutions to connect to home networks, which is a lot more secure.

Unfortunately for now, it will continue to be our collective responsibility as consumers to keep our devices up-to-date and in check. Looking forward, we can hope that manufactures will begin to integrate security into IoT devices from the ground up, helping secure the connected world for everyone.

Pawani Vaddi joined Webroot in March 2017 as the product manager for its consumer product line. She has worked in the cybersecurity industry for more than six years in different careers, moving from engineering roles into product management. Before Webroot, she worked for Symantec and Sonicwall.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises are Attacking the Cybersecurity Problem
Concerns over supply chain vulnerabilities and attack visibility drove some significant changes in enterprise cybersecurity strategies over the past year. Dark Reading's 2021 Strategic Security Survey showed that many organizations are staying the course regarding the use of a mix of attack prevention and threat detection technologies and practices for dealing with cyber threats.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-16060
PUBLISHED: 2021-10-15
Mitsubishi Electric SmartRTU devices allow remote attackers to obtain sensitive information (directory listing and source code) via a direct request to the /web URI.
CVE-2018-16061
PUBLISHED: 2021-10-15
Mitsubishi Electric SmartRTU devices allow XSS via the username parameter or PATH_INFO to login.php.
CVE-2021-27561
PUBLISHED: 2021-10-15
Yealink Device Management (DM) 3.6.0.20 allows command injection as root via the /sm/api/v1/firewall/zone/services URI, without authentication.
CVE-2020-4951
PUBLISHED: 2021-10-15
IBM Cognos Analytics 11.1.7 and 11.2.0 contains locally cached browser data, that could allow a local attacker to obtain sensitive information.
CVE-2021-28021
PUBLISHED: 2021-10-15
Buffer overflow vulnerability in function stbi__extend_receive in stb_image.h in stb 2.26 via a crafted JPEG file.