sb-eu logo
Story image

IoT home connectivity on the up, as are cybersecurity threats

In Oceania, nearly 50% of homes have at least one connected Internet of Things device, while globally this statistic is 40%.

As this number grows the number of security risks also grows, the study from Stanford University and Avast shows.

The new research paper, ‘All Things Considered: An Analysis of IoT Devices on Home Networks’, is the largest global study to date that focuses on IoT devices.

Stanford University assistant professor of computer science Zakir Durumeric says, “The security community has long discussed the problems associated with emerging IoT devices.”

Durumeric says, “Unfortunately, these devices have remained hidden behind home routers and we’ve had little large-scale data on the types of devices deployed in actual homes. This data helps us shed light on the global emergence of IoT and types of the security problems present in the devices real users own.”

The research reveals greater insights into the IoT ecosystem and subsequent cybersecurity challenges in homes across the world.

When it comes to Oceania, 49.2% of homes in Oceania have IoT devices, which places the region slightly behind Western Europe, which is second highest at 53.5%.

Furthermore, 30.7% of homes have media devices, 19.8% have work-related IoT hardware and 10.1% have gaming consoles.

Globally, even with more than 14,000 IoT manufacturers worldwide, 94% of all IoT devices are manufactured by just 100 vendors. According to Avast, this is an opportunity for manufacturers to improve security.

Avast head of AI Rajarshi Gupta says, “A key finding of this paper is that 94% of the home IoT devices were made by fewer than 100 vendors, and half are made by just ten vendors. This puts these manufacturers in a unique position to ensure that consumers have access to devices with strong privacy and security by design.”

By hardening these devices against unwanted access, manufacturers can help prevent bad actors from compromising these devices for spying or denial of service attacks, Avast states.

When it comes to cybersecurity, protocols like FTP and Telnet are still used by millions of devices. In fact, more than 7% of all IoT devices still use these protocols, making them especially vulnerable, according to the study.

This is also the case for 15% of home routers, which act as a gateway into the home network. According to Avast, this is a serious issue as when routers have weak credentials they can open up other devices and potentially homes to an attack.

The research shows that surveillance devices and routers consistently support Telnet protocol. Surveillance devices have the weakest Telnet profile, along with routers and printers. This aligns with historical evidence such as the role of Telnet in the Mirai botnet attacks that suggests these kinds of devices are both numerous and easy to compromise, Avast says.

To complete the research, Avast scanned 83 million IoT devices in 16 million homes worldwide to understand the distribution and security profile of IoT devices by type and manufacturer. The findings were then validated and analysed by research teams at Avast and Stanford University.

Users contributed data to the study using Avast’s Wi-Fi Inspector, which scans home networks for vulnerabilities and identifies potential security issues.

Story image
CrowdStrike expands Linux protection, adds machine learning prevention
CrowdStrike says its solution delivers proven breach prevention and visibility from its cloud-delivered platform via a single lightweight agent.More
Story image
FireEye revamps its flagship anti-malware solution
The Endpoint Security solution has received several enhancements, including the availability of several new modules for protection, investigation and response.More
Story image
VMware reveals plans to acquire Octarine, going all in for Kubernetes
VMware says once the acquisition is completed, Octarine’s integration will provide new security features for containerized applications running in Kubernetes, and will enable security capabilities as part of the fabric of the existing IT and DevOps ecosystems.More
Story image
Months on, many organisations still don't have secure remote access - report
The report analyses the extent to which businesses were prepared for the sudden shift into remote working due to COVID-19 restrictions, and analyses how organisations have adjusted to support remote workers amidst the COVID-19 pandemic. More
Story image
Four tips for organisations to help future-proof their OT security strategy
IT and OT networks are founded on different and often conflicting priorities, making IT-OT security challenging for businesses. Only when the needs of both environments are thoroughly understood can digital convergence be successful.More
Story image
New detection tool aims to catch Twitter bots in real time
Twitter recognises that it’s hard to tell just how much misinformation is out there on social media.More