-Amritanshu Satapathy(Class of 2021, IBS Hyderabad)
Description
The Internet of Things(IoT) is one of the most talked about trends in technology. There are a plethora of devices being released daily. The real issue is each device opens a new attack vector that people never see coming. The downside is that this new technology can also let in some unwanted strangers.
Some simple IoT devices that can become entry points for hackers
Using these five types of IoT devices might add risks in the form of spying, exploitation, blackmail and theft. Not all of these are limited to the virtual realm either but could spill over into real-life threats as well.
1.Wireless Cameras
People put up cameras outside their homes for peace of mind. Yet a camera that’s constantly sending footage over the internet can become a security disaster if outsiders gain access to it. There are now whole websites dedicated to streaming CCTV and home camera footage from hacked wireless cameras and webcams.
Precautions to be taken: Make sure to change the default password when buying and setting up camera. The passwords that come pre-installed with cameras are often common knowledge or very easy to guess at. Setting up two-factor authentication as well for an additional layer of security is also recommended as a best practice.
2. Smart home assistants
The market is near bursting with a wide selection of smart home voice assistants from major companies like Alexa from Amazon or Google’s smart home assistant are growing even more popular under homeowners. Yet these devices aren’t always secure.
Precautions to be taken:
Those who buy smart home assistants with the trust of the company must remember that nothing is impenetrable. Additional security measures are advised which can be manually activated from the settings of the device.
3. Smart door locks
Smart door locks are the latest in high-tech home security and come with a host of useful features. They can usually be locked and unlocked from anywhere as well. Smart locks are vulnerable to hacking and breaking with zero risks for the perpetrator.
Precautions to be taken:
Once installed, make sure to always keep the device’s firmware up to date and change the keypad number often. It is advised to never install an app that unlocks the door on too many devices.
How to stay un-hacked ?
Many IoT devices have been known to have vulnerabilities that allow attackers to remotely access or control them from the internet, while some have been found to have weak passwords that can’t be changed. Whatever the weakness in the device is, a vulnerable IoT product can potentially provide hackers with an easy way into other devices connected to the network.
The good news is that the most common IoT exploits outlined above are avoidable and can be remedied without any additional cost to the manufacturer. A good initial set of best practices when it comes to IoT security includes:
1. Upgrade the firmware on your IoT devices and change the default passwords.
2. Compile an inventory of IoT devices on your network so you have a complete picture of your risk exposure.
3. Contact the manufacturers of the IoT devices deployed on your network and ask if they’ve accounted for the common vulnerabilities outlined above.
References: ·https://www.iotforall.com/5-worst-iot-hacking-vulnerabilities/ ·https://www.cpomagazine.com/cyber-security/5-simple-iot-devices-that-can-become-entry-points-for-hackers/ ·https://www.darkreading.com/risk/unsecured-iot-8-ways-hackers-exploit-firmware-vulnerabilities/a/d-id/1335564