HouseCall for Home IoT Devices
Noticed any strange devices connected to your Wi-Fi?
Scan connected devices in your home network for security risks
Scan connected devices for security risksLearn more
Smart home devices and applications took center stage at many tech events in 2017 from CeBIT to Computex, and even MWC 2017, as cybersecurity threats have continued to grow hand in hand with the increase of connected devices. Trend Micro Incorporated today released the “Trend Micro 2017 1H Smart Home Network Security Summary,” revealing the top 10 regions most affected by cyberattacks on a home router and identifying key factors for in-home cyber security threat.
My girlfriend read something that worried her about the security risks posed by Internet of Things (IoT) devices at home. She had recently purchased a new TV, and she has an older home security system. She asked if her privacy might be at risk.
Technology has certainly changed how the world works, influencing almost every aspect of modern life. But while modern technology undeniably brings a number of advantages across multiple sectors, it also has its share of downsides.
What used to be the stuff of science fiction has turned into reality. No longer do we dream of a world where devices around us are interconnected, share information with one another, and carry out actions autonomously — we are now living in it, thanks to the so-called Internet of Things (IoT).
Households all over the world are rapidly adopting conversational user interface (CUI) technology, or the tech behind the voice assistants we know as Siri, Alexa, Cortana, and Google Assistant. Reports say that over 24 million voice-enabled machines were shipped in 2017, and the growth shows no sign of stopping. As more of these devices become available, users are quickly using them to their fullest potential, creating increasingly connected homes.
The rise of the Internet of Things (IoT) started when consumers began to interconnect home, work and mobile devices via the cloud so that valuable personal and work information could be easily accessed, no matter what the users were doing or where they might be located.
In many instances, researchers and engineers have found ways to hack into modern, internet-capable cars, as has been documented and reported several times. One famous example is the Chrysler Jeep hack that researchers Charlie Miller and Chris Valasek discovered. This hack and those that have come before it have mostly been reliant on specific vulnerabilities in specific makes and/or brands of cars.
Since the mid-1990s, many industrial companies have interconnected their industrial control systems (ICSs) to improve productivity, maintenance, and safety in the operational environment. Some of this interconnectivity was to the Internet. While, this connectivity helped to improved the efficiency, security was at best a minimal consideration.
A remote access and command execution vulnerability (CVE-2016-10176) was recently seen actively exploited by RouteX, a malware that targets Netgear routers. RouteX is designed to turn an infected router into a Socket Secure (SOCKS) proxy that in turn limits access to the device to the attacker.
There's no question that ransomware is one of the most formidable threats to a business. With so much riding on digitized data, important applications and other systems, any interruption to access of these crucial assets can quickly spell disaster for an organization.