Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Insecure Home IoT Devices a Clear and Present Danger to Corporate Security
Newest First  |  Oldest First  |  Threaded View
REISEN1955
REISEN1955,
User Rank: Ninja
6/24/2019 | 3:44:51 PM
Re: Consumers should consider security controls?
Have to agree - consumers in general know nothing about computers much less security much less what a secure password is.  " Oh, you mean I should change it?"   " But it was so easy to remember."   This is an old issue and it ain't going away ever.  Live with it. 

Ending is indeed classic: consumers will understand this? Consumers, meanwhile, should consider security controls that can observe traffic at the router-level, identify irregular device behavior, and quarantine malicious network flows or infected devices.

If I tried that on a residential account ==== blank stare for maybe a week. 
BadWiscoJ
BadWiscoJ,
User Rank: Apprentice
6/19/2019 | 12:14:21 PM
Consumers should consider security controls?
The last comment in your article states that "Consumers, meanwhile, should consider security controls that can observe traffic at the router-level, identify irregular device behavior, and quarantine malicious network flows or infected devices." How exactly do you expect them to do that? Consumer's just aren't knowledgeable enough to do something like this.
nomad52
nomad52,
User Rank: Apprentice
6/19/2019 | 8:24:41 AM
well duh
This was old news among security auditors three years ago.   nearly zero has been done to secure these devices, identify the actual risks, get vendors to path vulnerabilities or a useful mechanism to apply the patches. 

I keep wondereing what it will take to clean up this mess


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Improving Enterprise Cybersecurity With XDR
Enterprises are looking at eXtended Detection and Response technologies to improve their abilities to detect, and respond to, threats. While endpoint detection and response is not new to enterprise security, organizations have to improve network visibility, expand data collection and expand threat hunting capabilites if they want their XDR deployments to succeed. This issue of Tech Insights also includes: a market overview for XDR from Omdia, questions to ask before deploying XDR, and an XDR primer.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-31943
PUBLISHED: 2022-07-01
MCMS v5.2.8 was discovered to contain an arbitrary file upload vulnerability.
CVE-2022-32093
PUBLISHED: 2022-07-01
Hospital Management System v1.0 was discovered to contain a SQL injection vulnerability via the loginid parameter at adminlogin.php.
CVE-2022-32094
PUBLISHED: 2022-07-01
Hospital Management System v1.0 was discovered to contain a SQL injection vulnerability via the loginid parameter at doctorlogin.php.
CVE-2022-32095
PUBLISHED: 2022-07-01
Hospital Management System v1.0 was discovered to contain a SQL injection vulnerability via the editid parameter at orders.php.
CVE-2022-32384
PUBLISHED: 2022-07-01
Tenda AC23 v16.03.07.44 was discovered to contain a stack overflow via the security_5g parameter in the function formWifiBasicSet.