Smart Home

2017/03/27

Protecting Physical Security Systems against Network Attacks

Protecting Physical Security Systems against Network Attacks

Every building—regardless of whether it accommodates enterprises or private owners—has security systems in place to protect valuable assets. These physical security systems range from simple access control, meaning doors and locks, to widespread surveillance systems and multiple alarms. And as these different systems grow more sophisticated, building administrators are finding ways to make managing them more convenient.

2017/03/08

Another Challenge For IoT: Open Backdoors

Another Challenge For IoT: Open Backdoors

Problems with hardcoded credentials are hitting consumer IoT devices, industrial SCADA devices, and even critical infrastructure. Despite the appeal on source code and firmware audition, this type of vulnerability recurs and threatens users’ privacy and data security.

2017/01/31

Securing Your Routers Against Mirai and Other Home Network Attacks

Securing Your Routers Against Mirai and Other Home Network Attacks

Do you know if your router has turned into a zombie? It could be part of a botnet responsible for the DDoS attacks that have been taking down company websites.
Last year, the Mirai botnet launched massive and widespread attacks by leveraging vulnerable connected devices (including routers, CCTV cameras, DVRs etc.) and turning them into weaponized zombies.

2017/01/31

Routers Under Attack: Current Security Flaws and How to Fix Them

Routers Under Attack: Current Security Flaws and How to Fix Them

How is it possible for users to lose hundreds of dollars in anomalous online bank transfers when all of their gadgets have security software installed?
Last year, user Y, who is based in Brazil, lost R$600 (US$191.02, as of January 30, 2017) as a side effect of information theft. Upon discovering this, Y immediately called an IT technician to find the root cause. The technician originally chalked up the incident to Y accessing a fake website.

2016/12/20

Netgear Vulnerability Calls for Better Router Security across Businesses and Homes

Netgear Vulnerability Calls for Better Router Security across Businesses and Homes

On December 9, security researchers at Carnegie Mellon University warned about a major vulnerability discovered in several popular Netgear routers that could leave thousands of home networking devices exposed to arbitrary command injection. If exploited, hackers could gain full control of these devices and incorporate the compromised device to a botnet.

2016/12/14

Home Routers: Mitigating Attacks that can Turn them to Zombies

Home Routers: Mitigating Attacks that can Turn them to Zombies

With more households running smart devices that access the internet, the router is typically their only doorkeeper. And whether an end user has a laptop/desktop and router combo, or a miscellany of other devices connected to the network, the security risks are the same. Based on our research, home routers have been most susceptible to cross-site scripting (XSS) and PHP arbitrary code injection attacks, as well as being involved in carrying out DNS amplification attacks.

2016/11/06

Securing the Smart Home: Tips for Home Users and Manufacturers

Securing the Smart Home: Tips for Home Users and Manufacturers

Home users and home IoT device manufacturers can minimize the potential risks that come with a smart home. They just have to know where to start. Below are some practical security measures they can apply.

2016/11/05

From Comfort to Chaos: The Risks of Owning a Smart Home

From Comfort to Chaos: The Risks of Owning a Smart Home

What do you do when the thing that’s supposed to make your life easier starts working against you?
It was April 2015 when a couple from Washington discovered something unsettling. Their three-year-old son had been complaining about an invisible man talking to him at night. They were initially apprehensive about the story until they themselves heard a stranger’s voice come out of the baby monitor they installed in their son’s room.

2016/11/04

The Usual Suspects: IoT Attackers and Motivations

The Usual Suspects: IoT Attackers and Motivations

Who would attack a smart home and why? What would an attacker gain by doing so? Unlike PCs and smartphones, IoT devices—at least those available in the market right now—don't all run on a single operating system.This difference makes it more challenging for interested people to launch attacks on a wide scale. Compromising the security of such devices would also require a bit of knowhow and the right tools.

2016/11/03

Welcome to the Smart Home: IoT Adoption and Security Accountability

Welcome to the Smart Home: IoT Adoption and Security Accountability

One day, everything will be buttonless. Nobody will ever need to grab the remote to turn on the television or hit a switch to kill the lights. These devices will just do what they’re supposed to, all by themselves, without any physical prompts from the user. They won’t be set off by claps, or voice commands, or hand gestures in the air.

2016/11/02

Insights from CREATEC JAPAN 2016: Will threats find their way to IoT devices?

Insights from CREATEC JAPAN 2016: Will threats find their way to IoT devices?

From October 4 to 7, CEATEC JAPAN 2016 was held at the Makuhari Messe. This year’s theme, “Connecting Society, Creating the Future”, puts the focus on cyber-physical systems (CPS) and the Internet of things (IoT), and how these trends affect current industrial structures, business models, and society. Compared to previous years, the recorded number of attendees—both for exhibitors and registered visitors numbers—greatly increased.

2016/10/14

IoT Design Flaws and Security Guidelines

IoT Design Flaws and Security Guidelines

We look at IoT as a system that connects an infinite number of devices to the Internet. This new era of IoT brings the possibility of improving our lives in many different ways like smart homes, smart cities, and smart cars.

2016/06/13

FLocker Mobile Ransomware Crosses to Smart TV

FLocker Mobile Ransomware Crosses to Smart TV

Using multiple devices that run on one platform makes life easier for a lot of people. However, if a malware affects one of these devices, the said malware may eventually affect the others, too. This appears to be the case when we came across an Android mobile lock-screen ransomware, known as “FLocker,” that is capable of locking smart TVs as well.

2016/04/11

Mobile Devices Used to Execute DNS Malware Against Home Routers

Mobile Devices Used to Execute DNS Malware Against Home Routers

Attacks against home routers have been going around for years—from malware that rigs routers to DNS rebinding attacks and backdoors, among others. Just last year one of our researchers reported a Domain Name System (DNS) changer malware that redirected users to malicious pages when they visited specific websites. This enabled cyber crooks to get hold of the victims’ online credentials, such as passwords and PINs.

2016/03/30

Let Me Get That Door for You: Remote Root Vulnerability in HID Door Controllers

Let Me Get That Door for You: Remote Root Vulnerability in HID Door Controllers

If you’ve ever been inside an airport, university campus, hospital, government complex, or office building, you’ve probably seen one of HID’s brand of card readers standing guard over a restricted area. HID is one of the world’s largest manufacturers of access control systems and has become a ubiquitous part of many large companies’ physical security posture.

Recommended Video

Cybersecurity Risks in Complex IoT Environments

Company Information

Security Blog
PageTop