IoT in your home: what are the risks?
1 September 2018
Smart Home Automation
Information Security
Smart homes are getting even smarter, with Internet of Things (IoT) devices rapidly coming to market to make homes more efficient and daily life more convenient. But any Internet connection comes with risk attached, and IoT in homes could increase your vulnerability, warns Fortinet.
IoT takes smart home technology a step further into the future, adding smart sensors and independent Internet connections to appliances and devices to take the task of controlling them out of the hands of their owners. For example, where smart fridges or air conditioners might need to be controlled using a mobile app, an IoT-enabled appliance might control itself without needing the homeowner’s input.
IoT-enabled appliances measure temperature or available light, for example, to automatically trigger an action in an appliance. By using IoT sensors and connected SIMs, manufacturers are now producing heaters and air conditioners that switch on and off to maintain a constant room temperature, lights that switch themselves on when a room is dark, planters that automatically water plants when needed, or door locks that recognise the home owner and unlock without them needing keys.
“IoT-enabled appliances will certainly start arriving in the homes of ordinary South Africans soon,” says Doros Hadjizenonos, regional sales director at Fortinet. “People are already moving to smart homes and embracing devices such as smart TVs and media servers. While these devices make life simpler and easier, the challenge is that not all manufacturers make security their top priority when building smart devices.”
Fortinet’s latest Global Threat Landscape Report found that cyber criminals are already targeting IoT devices and media servers in homes for ‘cryptojacking’, in which they use a device’s computing power to mine cryptocurrency. The report said: “They are an especially attractive target because of their rich source of computational horsepower, which can be used for malicious purposes. Attackers are taking advantage of them by loading malware that is continually mining because these devices are always on and connected. In addition, the interfaces for these devices are being exploited as modified Web browsers, which expands the vulnerabilities and exploit vectors on them.”
“Cryptojacking in itself may not be a direct threat to the owner of the IoT device, although it could make it run slower,” says Hadjizenonos. “But once the code in the home is being controlled by someone else, they could also turn their attention to monitoring personal information on the home network.”
Globally, smart devices such as baby monitors and even smart vacuum cleaners have been hacked in the past, and Hadjizenonos says there is little prevent criminals from stealing passwords, monitoring the movements of homeowners, or tracking their children in future.
“Consumers typically connect their smart appliances via one router, so this is where smart home security efforts should be focused,” he says. “Before investing in smart and IoT-enabled devices, it’s recommended that homeowners ensure that their networks are secure, take advantage of security services from their ISPs, and lock down their routers. Once they invest in smart appliances, they should remember to check regularly for patches and updates to keep these appliances and devices secure.”
Further reading:
Identity is a cyber issue
Access Control & Identity Management Information Security
Identity and access management telemetry has emerged as the most common source of early threat detection, responsible for seven of the top 10 indicators of compromise leading to security investigations.
Read more...
Identity and authentication
Technews Publishing SMART Security Solutions
Access Control & Identity Management Information Security Security Services & Risk Management
Identity authentication is a crucial aspect of both physical security and cybersecurity.
SMART Security Solutions obtained insights into the topic and the latest developments from three companies.
Read more...
Smart surveillance and cyber resilience
Axis Communications SA
Surveillance Information Security Government and Parastatal (Industry) Facilities & Building Management
South Africa’s critical infrastructure sector has to step up its game regarding cybersecurity and the evolving risk landscape. The sector has become a prime target for cybercriminals on top of physical threat actors, and the consequences of an incident can be far-reaching.
Read more...
Autonomous healing systems are the future
Infrastructure Information Security AI & Data Analytics
Autonomous healing software, an emerging technology, is gaining traction for its potential to transform how organisations manage software maintenance, security, and system performance.
Read more...
Kaspersky detects over 1 million daily tracking attempts
Kaspersky
News & Events Information Security
Kaspersky's latest analysis of the 25 most prevalent web tracking services, including Google services, New Relic and Microsoft, has revealed over 38 billion instances of web trackers collecting user behaviour data in 2024, with an average of one million detections per day.
Read more...
Onyyx wireless alarm
Technews Publishing
Editor's Choice Smart Home Automation
IDS has introduced Onyyx, a wireless alarm system engineered to provide complete system control via the Onyyx app or keyring, as well as seamless installation.
Read more...
Only 4% of surveyed organisations reported no cyberattacks
News & Events Information Security
As cyber threats escalate in frequency and sophistication, new research reveals an alarmingly high rate of security incidents over the past year, due to a lack of awareness and qualified professionals as key contributing factors.
Read more...
There is a SaaS for everything, but at what cost, especially to SMEs?
Editor's Choice Information Security Security Services & Risk Management
Relying on SaaS platforms presents significant cybersecurity risks as the number of providers in your landscape increases, expanding your attack surface. It is important to assess the strength of the SaaS providers in your chain.
Read more...
Addressing today’s mining challenges: cyber risks beyond IT
Editor's Choice Information Security Mining (Industry)
Despite the mining industry’s operational technology systems being vulnerable to cyberattacks, many decision-makers still see these threats as purely an IT issue, even though a breach could potentially disrupt mining operations.
Read more...
How to effectively share household devices
Smart Home Automation Information Security
Sharing electronic devices within a household is unavoidable. South African teens spend over eight hours per day online, making device sharing among family members commonplace. Fortunately, there are methods to guarantee safe usage for everyone.
Read more...