News

  |  Tags: industry views

The Insecurity of Things

The Internet of Things (IoT) is set to achieve even greater market penetration in 2017, moving us one step closer to the predicted figure of 28 billion devices by 2020. From a consumer-oriented perspective this is good news, but it’s also making waves as the security community struggles to regulate and secure a myriad of increasingly ’connected’ devices.

The Internet of Things

The convenience offered by IoT technology comes at a price. Devices like routers, webcams and DVRs are often designed with connectivity rather than security in mind. Sold with credentials that won’t (or can’t) be changed, they’re easy targets for hackers. The result? Vast botnets of captive machines, bought, sold and leveraged for some of the largest DDoS attacks ever recorded. 

We know that technology tends to outpace security, and the IoT is no different. Where does this leave us, going into 2017? Proactive monitoring – the kind provided by Silobreaker’s OSINT – is one way to guard against emerging threats. But the biggest burden falls on manufacturers and end-users. Firstly, IoT technology must become more secure; hard-coded credentials won’t cut it anymore. Secondly, end-users must take ownership of their devices and learn to manage the associated privacy and security risks. Ultimately, we must also have a conversation about the data these devices collect, and how it is used.

More News

  • Silobreaker Daily Cyber Digest – 20 February 2018

      Malware Gaming company Flight Sim Labs accused of making game mod add-on with embedded malware Reddit user crankyrecursion pointed out that the most...
  • Silobreaker Daily Cyber Digest – 19 February 2018

      Malware Fortiguard Labs observes new variant of jRAT being spread via package delivery scam jRAT, also known as Adwind, is a commercial cross...
  • Silobreaker Daily Cyber Digest – 16 February 2018

    Malware New Android malware Fakeapp harvests Fakebook account details from devices in Asia-Pacific Android.Fakeapp logs into victims’ accounts and harvests their details. Most of...
View all News

Request a demo

Get in touch