Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity
    • Networking

    Symantec Study Finds Home Smart Devices Wide Open to Cyber-Attack

    Written by

    Robert Lemos
    Published March 18, 2015
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Companies creating smart devices for the home promise a more energy- and time-efficient future, but are failing to secure their products, potentially making the homes of early adopters less secure, according to a study of some 50 consumer smart devices by security firm Symantec.

      In a report published on March 12, Symantec examined a variety of devices, including smart thermostats, locks, light bulbs, smoke detectors, energy management devices, and smart hubs, which link together the various smart products and allow the user to manage them.

      All of the devices failed to check whether they were communicating with an authorized server, leaving them open to man-in-the-middle attacks. One out of five devices did not encrypt communications and many did not lock out attackers after a certain number of password attempts, further weakening their security, Symantec stated in the report.

      “All of the potential weaknesses that could afflict Internet of things systems, such as authentication and traffic encryption, are already well known to the security industry, but despite this, known mitigation techniques are often neglected on these devices,” Symantec researchers stated in the report.

      The lack of security comes as consumers are increasingly adopting a variety of connected devices and using them in their homes. An estimated 2.9 billion devices will be used by consumers in 2015, according to market research group Gartner.

      “Security and privacy of IoT devices and data should be a mandate for device manufacturers,” researchers with Symantec’s security response group, said in an email interview with eWEEK. “It would be unfortunate if a large scale, singular incident was the turning point for IoT security. These vulnerabilities are easily fixed, and with proper security methods in place, a potential disaster scenario is easily avoidable.”

      Symantec’s research into the security of smart devices mainly focused on local vulnerabilities. Smart devices typically connect to a home user’s network through common communications technology, such as WiFi, Ethernet, or through newer low-power local networking technology, such as Bluetooth, Zigbee or Z-Wave. Smart hubs, which manage devices in the home, typically support Zigbee or Z-Wave communications.

      Most of the smart-home technology tested by Symantec assumes that the local wireless network is secure. An attacker that has gained access to the local network—via proximity or via malware installed on a local computer system—can further compromise the local smart devices. In one experiment, researchers were able to update a LightwaveRF smart hub with their own software, for example, because the device does not encrypt nor authenticate its update requests. In another possible attack, researchers found they could just send commands to a Belkin WeMo hub, because the devices took no security measures against traffic on the local network.

      “The device did not require the user to provide authentication in order to connect to it,” the researchers stated. “If the attacker is on the same network as the device, they can send any commands they want to the connected switch.”

      More than two-thirds of devices tested had an associated cloud service. Some services were just used to collect data from the device, but many allowed the remote management of smart home devices. Almost all the services allowed users to set weak passwords and many had insecure password recovery methods.

      The saving grace of today’s IoT is that there is no obvious way to profit from the most devices’ insecurities, Symantec researchers stated in the email interview.

      “While vulnerabilities do exist, we haven’t seen any actively exploited threats in the wild,” they said. “That doesn’t mean smart home hacking won’t occur in the near future. Once hackers find motivation, it’s inevitable these devices will be hacked unless security measures are implemented by manufacturers.”

      Robert Lemos
      Robert Lemos
      Robert Lemos is an award-winning journalist who has covered information security, cybercrime and technology's impact on society for almost two decades. A former research engineer, he's written for Ars Technica, CNET, eWEEK, MIT Technology Review, Threatpost and ZDNet. He won the prestigious Sigma Delta Chi award from the Society of Professional Journalists in 2003 for his coverage of the Blaster worm and its impact, and the SANS Institute's Top Cybersecurity Journalists in 2010 and 2014.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.