Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Saturday, 27 May, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Alexa: How Secure Is My Smart Home?

by The Gurus
August 22, 2019
in Security News
Alexa: How Secure Is My Smart Home?
Share on FacebookShare on Twitter

By David Emm, Principal Security Researcher, Kaspersky

Baby monitors, CCTV tools and smart home devices like Amazon Alexa and Google Home are all handy additions to today’s modern home. A quarter of Britons now own one or more smart home devices, and by 2023 every home in the UK is expected to contain at least 50 of them. It is therefore becoming increasingly important for consumers to consider the dangers of IoT devices in their homes, as they could be vulnerable to criminals who could be watching or listening and waiting to attack.

During the 2018 Christmas period, the biggest spenders in the UK were families with children, and toys accounted for 31% of online purchases. Many of these toys will have connectivity built in. Yet often, little thought is given to how to secure a connected toy is. Meanwhile, items such as stairgates and child safety locks are seen as an essential part of a family home to protect children from danger. The same level of thought should be given to protecting children from connected toys and monitors from the moment they are purchased.

As connectivity continues to spread into more areas of our home and working lives, manufacturers eagerly continue to put ‘smart’ products on the market that will sell. However often they do so without ensuring that these products have sufficient security measures in place to protect the people that use them. Many of these devices, such as baby monitors, have become such as established part of our everyday lives that we often rely on them without really thinking beyond the benefits they provide. However, in today’s evolving technology landscape – and with the growing threat from cybercriminals – this way of thinking must change.

When manufacturers install voice recognition, or other smart elements, to a toy, the threat vector for consumers becomes very real, even if the device has been bought from a trusted brand. Even trusted and well-known toys such as Mattel’s Barbie were found to have potential vulnerabilities when they came onto the market.

These attacks are no longer just a theoretical possibility, they have actually taken place and left people in danger. One example is a criminal who hacked into parents’ baby monitors and threatened to kidnap a 4-month-old child.

One key security challenge that consumers face in relation to connected devices in their home is that they may not be directly affected by the actions a cybercriminal takes to compromise the device. Cybercriminals might bide their time – for example, gathering personal data, but not acting until they have everything they need, so that their attack goes unnoticed until it’s too late. In addition, cybercriminals might use the device to launch a DDoS (Distributed Denial of Service) attack on the provider of some online resource at the other side of the world.

Manufacturers must help consumers mitigate the risks of connected technology by ensuring basic security protocols – and building security into the design of smart tools, toys and other devices. Vendors must take cyber-security seriously. The government’s initiative and code of practice for the design of IoT devices is a positive step in the right direction (although I would also like to see it include some form of ‘smart-safe’ logo that can be easily identified by potential purchasers of a device..

However, the need to keep connected devices secure isn’t solely the responsibility of manufacturers. Kaspersky advises consumers to always consider the following, to ensure the safe use of their smart devices:

1. Are the extras essential?

Do you need the functionality that’s in the device you’ve just bought? If it comes with X, Y and Z, but you only really need X, disable what you don’t need, or look for a product with just the functionality you need. More functionality simply makes a product more vulnerable to a cyber-attack.

2. Look at reviews.

Has this product been reviewed – and well? Has it got a good reputation in terms of safety? If there’s a lot of negative feedback, consider whether you should invest in it at all.

3. Change default settings.

Does the device come with a default password? If it does, change it immediately. Some manufacturers of routers, for example, ship a devices with a unique key – which is something that all manufacturers should be doing. However, they aren’t yet, so consumers must get into the habit of changing default passwords quickly.

4. Will the device update itself?

The chances are that in the future, a cybercriminal will find a vulnerability that lets them compromise a new device. Check if the device you are planning to buy can be updated by the manufacturer.

5. Change your thought process.

The device might provide functionality that pre-dates the digital age – for example, baby monitors. As a result, we’re not thinking about digital security. We must all start to think about digital security, in the same way that we think about real world dangers, from the moment they buy a connected device. Consider the risks and how you can mitigate them

FacebookTweetLinkedIn
ShareTweet
Previous Post

UK FinTech CashFlows Continues Growth With Akamai In Face Of Increasing Cyberthreats.

Next Post

Sounding The Alarm: Can Your Home Security System Be Hacked?

Recent News

SnapDragon Monitoring scam advice

Tips to Protect Against Holiday and Airline Scams

May 25, 2023
Access Segmentation & Encryption Management from MyCena

New security model launched to eliminate 95% of cyber breaches

May 25, 2023
KnowBe4 Helps Organisations Battle QR Code Phishing Attacks With New Tool

KnowBe4 Helps Organisations Battle QR Code Phishing Attacks With New Tool

May 25, 2023
Purple Logo, capitalised letters: SALT.

Salt Security Uncovers API Security Flaws in Expo Framework, Issues have been Remediated

May 24, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information