aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • Tech

This Site Shows The Security Risks Of Your Smart Devices

  • root
  • September 17, 2019
  • 4 minute read

Consumer-grade internet of things (IoT) devices aren’t exactly known for having tight security practices. To save purchasers from finding that out the hard way, researchers have done security assessments of representative devices, awarding scores ranging from 28 (an F) up to 100.

Their site, yourthings.info, shows rankings for 45 devices, though researchers have evaluated a total of 74. That’s hardly a complete roundup of the tens of thousands of devices available, but the big idea behind the project is to help consumers understand important issues before connecting a new IoT helper to their home networks.


Partner with aster.cloud
for your next big idea.
Let us know here.



From our partners:

CITI.IO :: Business. Institutions. Society. Global Political Economy.
CYBERPOGO.COM :: For the Arts, Sciences, and Technology.
DADAHACKS.COM :: Parenting For The Rest Of Us.
ZEDISTA.COM :: Entertainment. Sports. Culture. Escape.
TAKUMAKU.COM :: For The Hearth And Home.
ASTER.CLOUD :: From The Cloud And Beyond.
LIWAIWAI.COM :: Intelligence, Inside and Outside.
GLOBALCLOUDPLATFORMS.COM :: For The World's Computing Needs.
FIREGULAMAN.COM :: For The Fire In The Belly Of The Coder.
ASTERCASTER.COM :: Supra Astra. Beyond The Stars.
BARTDAY.COM :: Prosperity For Everyone.

“A lot of people who purchase these devices don’t fully understand the risks associated with installing them in their homes,” says Omar Alrawi, a graduate research assistant at the Georgia Institute of Technology. “We want to provide insight by providing security ratings for the devices we have tested.”

Vulnerabilities In The Internet-Connected Devices

Voice-activated personal digital assistants are among the most common home IoT devices, but if not properly installed, they can provide unwanted access to the home networks to which they are connected, warns Manos Antonakakis, a cybersecurity researcher and associate professor in Georgia Tech’s School of Electrical and Computer Engineering.

“If you have an IoT app that is vulnerable, whoever has access to that app not only has access to your personal information, but could also jump into your home and eavesdrop on your conversations,” he says. “Anything that is connected in the home in proximity to the personal assistant could also interact with it. If there is vulnerable software running on the device, it could be exploited within the home network.”

Read More  5G: The Backbone Of 2020's Digital Ecosystems

One problem is that most home networks were set up for simple tasks like sharing printers, so they lack the kind of security controls found on enterprise systems at businesses, notes Chaz Lever, a research engineer in the School of Electrical and Computer Engineering.

“The home network is beginning to look a lot like enterprise networks with a range of services that have to be protected,” Lever says. “But the average consumer is not going to be equipped to do that. They don’t have an IT staff that is doing audits and securing the devices. If these devices are not secure out of the box and there aren’t easy ways to secure them, they can open the home up to a new vector of attacks.”

Risk Assessment

To give consumers helpful advice, the researchers developed a framework for analyzing the devices’ security components. In what is believed to be the first effort to objectively assess the risks of IoT equipment, they examined the devices themselves, how the devices communicate with cloud servers, the applications running on the devices, and the cloud-based endpoints.

“The more services running on the device, the higher the probability that some of them will be vulnerable to attack,” Antonakakis says. “Providing many services may be attractive from a marketing perspective, but if you have multiple services, the risk increases.”

In their study of IoT devices, the researchers found wide variations in security depending on the manufacturer. In some cases, equipment made by small and lesser-known companies performed better than devices made by larger companies.

Read More  Google Cloud Next 2019 | Democratizing AI For Industrial Applications

“There are some devices that do security really well, and other manufacturers should learn from those exemplary devices,” Alrawi says. “We saw the full spectrum of good and bad, and sometimes we were surprised at the results of our evaluation.”

Because manufacturers design these products so that consumers can install them, these IoT devices must be easy to use. But ease of use can be the enemy of security. An example is a service known as UPnP, which makes devices known to the network during installation so communications can be established.

But a device announcing itself on the network can attract attackers, Lever notes. “It’s helpful for the devices to communicate what they do, but that opens up vulnerabilities. The choice of protocols affects not only the device, but also the security of the network on which it is running.”

Patching Your Refrigerator

Internet-connected light bulbs are unlikely to have a long service life, but that’s not the case with expensive appliances like internet-connected refrigerators. Antonakakis worries that these devices could become security risks without regular updates.

“Ideally, the consumer shouldn’t have to be aware that their refrigerator needs updates that have to be downloaded to the device,” he says. “We want that to happen automatically and securely. Why should anyone have to know how to patch their refrigerator?”

While the notion of hacking a slow cooker might seem amusing, the devices have heating elements that could cause a fire if a malicious actor turned up the temperature. Attacks can also affect more than a homeowner. In 2016, the Mirai botnet took advantage of unsecured internet-connected cameras—many of them baby monitors—to create a massive distributed denial of service attack that left much of the internet unavailable.

Read More  Google Cloud Next 2019 | Insight to Action With Deloitte: Driving ROI With Marketing Analytics

Beyond educating consumers, the researchers hope to encourage better security by device manufacturers by tracking security trends over time.

“We hope to inspire both technical and policy next steps,” says Antonakakis. “There is a need for establishing policy and standards. We want to raise the security level of all these devices. There is a lot more that could be done.”

Fabrian Monrose from the University of North Carolina at Chapel Hill was also a member of the research team.

The US Department of Commerce, the National Science Foundation, and the Air Force Research Laboratory/Defense Advanced Research Projects Agency supported the research. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the sponsors.

Source: Georgia Tech & Futurity.org


For enquiries, product placements, sponsorships, and collaborations, connect with us at [email protected]. We'd love to hear from you!

Our humans need coffee too! Your support is highly appreciated, thank you!

root

Related Topics
  • Internet Of Things
  • IoT
  • Security
You May Also Like
Getting things done makes her feel amazing
View Post
  • Computing
  • Data
  • Featured
  • Learning
  • Tech
  • Technology

Nurturing Minds in the Digital Revolution

  • April 25, 2025
View Post
  • Tech

Deep dive into AI with Google Cloud’s global generative AI roadshow

  • February 18, 2025
Volvo Group: Confidently ahead at CES
View Post
  • Tech

Volvo Group: Confidently ahead at CES

  • January 8, 2025
zedreviews-ces-2025-social-meta
View Post
  • Featured
  • Gears
  • Tech
  • Technology

What Not to Miss at CES 2025

  • January 6, 2025
View Post
  • Tech

IBM and Pasqal Plan to Expand Quantum-Centric Supercomputing Initiative

  • November 21, 2024
Black Friday Gifts
View Post
  • Tech

Black Friday. How to Choose the Best Gifts for Yourself and Others, Plus Our Top Recommendations.

  • November 16, 2024
zedreviews-Apple-iPhone-16-Pro-finish-lineup-240909
View Post
  • Featured
  • Gears
  • Tech
  • Technology
  • Tools

Apple debuts iPhone 16 Pro and iPhone 16 Pro Max

  • September 10, 2024
zedreviews-Apple-iPhone-16-Apple-Intelligence-240909
View Post
  • Featured
  • Gears
  • Tech
  • Technology

Apple introduces iPhone 16 and iPhone 16 Plus

  • September 10, 2024

Stay Connected!
LATEST
  • college-of-cardinals-2025 1
    The Definitive Who’s Who of the 2025 Papal Conclave
    • May 7, 2025
  • conclave-poster-black-smoke 2
    The World Is Revalidating Itself
    • May 6, 2025
  • oracle-ibm 3
    IBM and Oracle Expand Partnership to Advance Agentic AI and Hybrid Cloud
    • May 6, 2025
  • 4
    Conclave: How A New Pope Is Chosen
    • April 25, 2025
  • Getting things done makes her feel amazing 5
    Nurturing Minds in the Digital Revolution
    • April 25, 2025
  • 6
    AI is automating our jobs – but values need to change if we are to be liberated by it
    • April 17, 2025
  • 7
    Canonical Releases Ubuntu 25.04 Plucky Puffin
    • April 17, 2025
  • 8
    United States Army Enterprise Cloud Management Agency Expands its Oracle Defense Cloud Services
    • April 15, 2025
  • 9
    Tokyo Electron and IBM Renew Collaboration for Advanced Semiconductor Technology
    • April 2, 2025
  • 10
    IBM Accelerates Momentum in the as a Service Space with Growing Portfolio of Tools Simplifying Infrastructure Management
    • March 27, 2025
about
Hello World!

We are aster.cloud. We’re created by programmers for programmers.

Our site aims to provide guides, programming tips, reviews, and interesting materials for tech people and those who want to learn in general.

We would like to hear from you.

If you have any feedback, enquiries, or sponsorship request, kindly reach out to us at:

[email protected]
Most Popular
  • 1
    Tariffs, Trump, and Other Things That Start With T – They’re Not The Problem, It’s How We Use Them
    • March 25, 2025
  • 2
    IBM contributes key open-source projects to Linux Foundation to advance AI community participation
    • March 22, 2025
  • 3
    Co-op mode: New partners driving the future of gaming with AI
    • March 22, 2025
  • 4
    Mitsubishi Motors Canada Launches AI-Powered “Intelligent Companion” to Transform the 2025 Outlander Buying Experience
    • March 10, 2025
  • PiPiPi 5
    The Unexpected Pi-Fect Deals This March 14
    • March 13, 2025
  • /
  • Technology
  • Tools
  • About
  • Contact Us

Input your search keywords and press Enter.