Monday, December 05, 2016
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Uber Creates AI Lab With Geometric Intelligence Acquisition
Google Launches New Personal Safety App
Micron Introduces The TLC-based 5100 Enterprise SSDs
Panasonic May Buy Headlight Manufacturer ZKW
KAIST Sues Samsung, Qualcomm And Globalfoundries Over FinFET Patent Infringement
Samsung Offers Second Gear S2 Update
Google DeepMind Makes AI Training Platform Available On GitHub
LG To Introduce 5G Broadband FDR Communication Technology
Active Discussions
Which of these DVD media are the best, most durable?
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
Help make DVDInfoPro better with dvdinfomantis!!!
menu making
Optiarc AD-7260S review
cdrw trouble
 Home > News > General Computing > HP Says...
Last 7 Days News : SU MO TU WE TH FR SA All News

Tuesday, July 29, 2014
HP Says Internet of Things Devices Are Vulnerable to Attack


An HP study revealed that 70 percent of the most commonly used Internet of Things (IoT) devices contain vulnerabilities, including password security, encryption and general lack of granular user access permissions.

With the rise of IoT, the number and diversity of connected devices is expected to increase exponentially. According to Gartner, "the Internet of Things" will include 26 billion units installed by 2020. IoT product and service suppliers will generate incremental revenue exceeding $300 billion, mostly in services, in 2020."

This spike in demand is pushing manufacturers to quickly bring to market connected devices, cloud access capabilities and mobile applications in order to gain share. While this increase in IoT devices promises benefits to consumers, it also opens the doors for security threats ranging from software vulnerabilities to denial-of-service (DOS) attacks to weak passwords and cross-site scripting vulnerabilities.

"While the Internet of Things will connect and unify countless objects and systems, it also presents a significant challenge in fending off the adversary given the expanded attack surface," said Mike Armistead, vice president and general manager, Fortify, Enterprise Security Products, HP. "With the continued adoption of connected devices, it is more important than ever to build security into these products from the beginning to disrupt the adversary and avoid exposing consumers to serious threats."

HP scanned 10 of the most popular IoT devices, uncovering, on average, 25 vulnerabilities per device—totaling 250 security concerns across all tested products. The IoT devices tested—along with their cloud and mobile application components—were from manufacturers of TVs, webcams, home thermostats, remote power outlets, sprinkler controllers, hubs for controlling multiple devices, door locks, home alarms, scales and garage door openers.

The most common and easily addressable security issues reported include privacy concerns, insufficient authorization, lack of transport encryption, insecure web interface and inadequate software protection, the study found.

For instance, HP said that 8 of the 10 devices tested, along with their corresponding cloud and mobile application components, raised privacy concerns regarding the collection of consumer data such as name, email address, home address, date of birth, credit card credentials and health information. Moreover, 90 percent of tested devices collected at least one piece of personal information via the product itself, the cloud or its mobile application. 6 of the 10 devices evaluated raised security concerns with their user interfaces such as persistent XSS, poor session management, weak default credentials and credentials transmitted in clear text. And 60 percent of devices did not use encryption when downloading software updates, an alarming number given that software powers the functionality of the tested devices.

To protect against security hazards that come along with the rise of IoT, it is imperative for organizations to implement an end-to-end approach to identify software vulnerabilities before they are exploited.

Further details resulting from the study are available at hp.com/go/fortifyresearch/iot.



Previous
Next
IBM, ACS And AT&T Claim Breakthrough In Elastic Cloud-to Cloud Networking        All News        China Starts Anti-monopoly Investigation On Microsoft
IBM, ACS And AT&T Claim Breakthrough In Elastic Cloud-to Cloud Networking     General Computing News      China Starts Anti-monopoly Investigation On Microsoft

Get RSS feed Easy Print E-Mail this Message

Related News
HP Announces The Rugged ProBook x360 11 Education Edition
Hewlett Packard Enterprise Demonstrates First Memory-Driven Computer
Nokia, HP, Rumored To Release New Smartphones in 2017
New HP Z2 Mini Delivers Server-grade Power in a 2.3 by 8.5 inch Package
HP’s Holiday Lineup of New PCs
HP To Buy Samsung's Printer Business For $1.05 billion
HP Announces New Pavilion Wave and Elite Slice PCs
HP Unveils New Windows Gaming Devices
HP To Launch Vive Branded PCs
HP's Elite X3 Smartphone To Start Shipping This Month
Oracle To Pay HP $3 billion In Itanium Case
HP expands Chromebook Lineup With Touch

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2016 - All rights reserved -
Privacy policy - Contact Us .