Friday, July 21, 2017
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Intel, Microsoft and Amazon Side with Apple in Qualcomm's iPhone Ban Dispute
Samsung Galaxy Note 8 to debut on Aug. 23
Apple Turns to LG Chem for iPhone 9 Batteries
Microsoft Reports Strong Profit on Cloud Demand
Intel Introduces Movidius Neural Compute Stick
TSMC InFO packaging Enters Second Generation
Samsung Display to Provide OLED panels to Xiaomi
Qualcomm Profit Forecast Disappoints Amid Apple Legal Battles
Active Discussions
Which of these DVD media are the best, most durable?
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
Help make DVDInfoPro better with dvdinfomantis!!!
menu making
Optiarc AD-7260S review
cdrw trouble
 Home > News > General Computing > HP Says...
Last 7 Days News : SU MO TU WE TH FR SA All News

Tuesday, July 29, 2014
HP Says Internet of Things Devices Are Vulnerable to Attack


An HP study revealed that 70 percent of the most commonly used Internet of Things (IoT) devices contain vulnerabilities, including password security, encryption and general lack of granular user access permissions.

With the rise of IoT, the number and diversity of connected devices is expected to increase exponentially. According to Gartner, "the Internet of Things" will include 26 billion units installed by 2020. IoT product and service suppliers will generate incremental revenue exceeding $300 billion, mostly in services, in 2020."

This spike in demand is pushing manufacturers to quickly bring to market connected devices, cloud access capabilities and mobile applications in order to gain share. While this increase in IoT devices promises benefits to consumers, it also opens the doors for security threats ranging from software vulnerabilities to denial-of-service (DOS) attacks to weak passwords and cross-site scripting vulnerabilities.

"While the Internet of Things will connect and unify countless objects and systems, it also presents a significant challenge in fending off the adversary given the expanded attack surface," said Mike Armistead, vice president and general manager, Fortify, Enterprise Security Products, HP. "With the continued adoption of connected devices, it is more important than ever to build security into these products from the beginning to disrupt the adversary and avoid exposing consumers to serious threats."

HP scanned 10 of the most popular IoT devices, uncovering, on average, 25 vulnerabilities per device—totaling 250 security concerns across all tested products. The IoT devices tested—along with their cloud and mobile application components—were from manufacturers of TVs, webcams, home thermostats, remote power outlets, sprinkler controllers, hubs for controlling multiple devices, door locks, home alarms, scales and garage door openers.

The most common and easily addressable security issues reported include privacy concerns, insufficient authorization, lack of transport encryption, insecure web interface and inadequate software protection, the study found.

For instance, HP said that 8 of the 10 devices tested, along with their corresponding cloud and mobile application components, raised privacy concerns regarding the collection of consumer data such as name, email address, home address, date of birth, credit card credentials and health information. Moreover, 90 percent of tested devices collected at least one piece of personal information via the product itself, the cloud or its mobile application. 6 of the 10 devices evaluated raised security concerns with their user interfaces such as persistent XSS, poor session management, weak default credentials and credentials transmitted in clear text. And 60 percent of devices did not use encryption when downloading software updates, an alarming number given that software powers the functionality of the tested devices.

To protect against security hazards that come along with the rise of IoT, it is imperative for organizations to implement an end-to-end approach to identify software vulnerabilities before they are exploited.

Further details resulting from the study are available at hp.com/go/fortifyresearch/iot.



Previous
Next
IBM, ACS And AT&T Claim Breakthrough In Elastic Cloud-to Cloud Networking        All News        China Starts Anti-monopoly Investigation On Microsoft
IBM, ACS And AT&T Claim Breakthrough In Elastic Cloud-to Cloud Networking     General Computing News      China Starts Anti-monopoly Investigation On Microsoft

Get RSS feed Easy Print E-Mail this Message

Related News
HP Takes Back PC Shipment Crown from Lenovo
HP Debuts Omen Accelerator, Powerful Omen and Omen X Compact Desktops
HP Debuts New Premium PC Portfolio Taking On Microsoft's Surface Models
Hewlett Packard Enterprise Reveals Powerful " The Machine" Computer Prototype, Although Key Technology Is Missing
HP Patches Keylogging Bug in Laptops
New HP Zbook Laptops Take On Apple's Mac Pro
HPE to Buy Nimble Storage for $1.09 billion
MWC: HP Announces The Pro x2 612 G2 Commercial Detachable
HP Recalls More Than 100,000 Laptop Batteries
CES 2017: HP Announces Redesigned Sprout Pro, 4K PCs and Curved Gaming Display
HP Announces The Rugged ProBook x360 11 Education Edition
Hewlett Packard Enterprise Demonstrates First Memory-Driven Computer

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2017 - All rights reserved -
Privacy policy - Contact Us .