{"id":15368,"date":"2019-05-22T06:00:01","date_gmt":"2019-05-22T14:00:01","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/05\/22\/news-9117\/"},"modified":"2019-05-22T06:00:01","modified_gmt":"2019-05-22T14:00:01","slug":"news-9117","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/05\/22\/news-9117\/","title":{"rendered":"Keep Your Smart Home Safe: Here\u2019s What You Can Do Today to Secure Your Products"},"content":{"rendered":"<p><strong>Credit to Author: Trend Micro| Date: Wed, 22 May 2019 12:59:05 +0000<\/strong><\/p>\n<p>The Internet of Things (IoT) is transforming the way we live, work and play. You can find it in the fitness trackers you might be wearing to monitor step count and heart rate. Or the car you may be driving. But more than anywhere else, you\u2019ll see IoT at home in an increasing array of gadgets: from voice-activated smart speakers to internet-connected baby monitors.<\/p>\n<p><a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2018-11-07-gartner-identifies-top-10-strategic-iot-technologies-and-trends\">It\u2019s estimated<\/a> that 14.2 billion connected \u201cthings\u201d like these are in use globally in 2019, which will rise to 25 billion in a couple of years\u2019 time. There\u2019s just one problem: if not properly secured, they could present hackers with new opportunities to sneak into your smart home through the cyber-front door.<\/p>\n<p>So what are the risks\u2014and how can you protect your home?<\/p>\n<p><strong>Governments take action<\/strong><\/p>\n<p>First, some good news: as consumers\u2019 homes fill with ever-greater numbers of smart gadgets, governments are aware of the growing risks of cyber-attacks. In the US, California is leading the way <a href=\"https:\/\/www.theverge.com\/2018\/9\/28\/17874768\/california-iot-smart-device-cybersecurity-bill-sb-327-signed-law\">with new legislation<\/a> designed to force manufacturers to improve the security of their products. <em><a href=\"https:\/\/leginfo.legislature.ca.gov\/faces\/billTextClient.xhtml?bill_id=201720180SB327\">SB-327<\/a><\/em> introduces minimum requirements such as forcing each user to set a unique device password the first time they connect.<\/p>\n<p>Following hot on the heels of the Golden State is the federal government. Introduced in March, the bipartisan <em><a href=\"https:\/\/www.scribd.com\/document\/401616402\/Internet-of-Things-IoT-Cybersecurity-Improvement-Act-of-2019\">Internet of Things (IoT) Cybersecurity Improvement Act of 2019<\/a><\/em> doesn\u2019t cover all IoT makers, only ones which sell products to the government. However, it is hoped that the law will have a knock-on effect with the wider industry, encouraging other manufacturers to raise their standards.<\/p>\n<p>But it\u2019s not only the US that is making moves to safeguard IoT users. The UK in May <a href=\"https:\/\/www.gov.uk\/government\/news\/plans-announced-to-introduce-new-laws-for-internet-connected-devices\">introduced a proposed new law<\/a> designed to force manufacturers to adhere to key security requirements, covering things like unique passwords and security updates. In addition, retailers will only be allowed to sell devices with a clear label telling consumers how secure they are.<\/p>\n<p>While Trend Micro welcomes any government moves to make smart home gadgets more secure, the truth is that it will take a while for these laws to take effect\u2014and even longer for them to have an impact on the firms designing and building our connected devices. The US federal proposal will require a separate standards body to hunker down and draw up its requirements first, which could take months. There\u2019s also a risk that when new laws take effect, the hackers will simply move on to use new tactics not legislated for.<\/p>\n<p>That\u2019s why consumers must act now to secure their smart home. Below we list some of the key threats and how to take action.<\/p>\n<p><strong>What\u2019s the problem?<\/strong><\/p>\n<p>The more smart gadgets there are in your home, the greater the number of potential targets for hackers. Devices could be hijacked if attackers manage to guess or crack the passwords protecting them, or exploit flaws in the underlying software (firmware) that runs them.<\/p>\n<p>This is made easier because some devices don\u2019t require a user to install a password; they simply run with an easy-to-guess factory default. Many manufacturers also don\u2019t issue regular updates (patches) either, or if they do, it\u2019s hard for users to find out about and install them. And unlike your laptop\/desktop and mobile devices, these IoT endpoints are typically too small to install AV on, further exposing them.<\/p>\n<p>Finally, it\u2019s not just the devices themselves that are at risk, but also the <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/internet-of-things\/threats-and-risks-to-complex-iot-environments\">complex, underlying automation systems<\/a> that link them together behind the scenes. This complexity creates gaps that bad guys are adept at exploiting.<\/p>\n<p>So, to simplify, there are three main threat vectors facing home networks:<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td><strong>1) Physical danger<\/strong><\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Devices could be remotely controlled by attackers to surveil the family. For example, by hijacking feeds from smart security cameras, or other sensors around the house such as smart door and window locks, burglars could work out when the property is empty. They could even remotely unlock doors or windows, if these are internet-connected \u2014 for example by cloning the owner\u2019s voice and playing commands via your home assistant.<\/p>\n<p>Cases have been reported in the past of hackers remotely monitoring smart homes. In one incident, a <a href=\"https:\/\/www.washingtonpost.com\/technology\/2018\/12\/20\/nest-cam-baby-monitor-hacked-kidnap-threat-came-device-parents-say\/?utm_term=.bf6378edb7b5\">baby monitor was hacked<\/a> and used to broadcast threats to the parents; while more extensive hacks of home security cameras have had their <a href=\"https:\/\/www.9news.com.au\/national\/security-cameras-home-spying-internet-streaming-privacy-safety\/00122b00-4ff1-43af-9788-2daa4d2ad0fa\">video content streamed online<\/a>.<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td><strong>2) Data loss and malware<\/strong><\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>These same devices are also a potential gateway into the home network, which could allow hackers to grab passwords for your key online accounts like banking and email. Any data they collect on you can be sold on the dark web and used for future identity fraud. <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/internet-of-things\/protect-home-network-securing-router\">The router<\/a> is in many ways the digital gateway to your smart home \u2014 the place where all your internet traffic passes through. That makes it particularly vulnerable to these kinds of attack. As well as data theft, hackers could be looking to spread malware such as ransomware and banking trojans.<\/p>\n<p>One major router threat spotted in 2018 was <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/internet-of-things\/reboot-your-routers-vpnfilter-infected-over-500-000-routers-worldwide\">VPNFilter<\/a>\u2014information-stealing malware which infected at least half a million routers globally by exploiting vulnerabilities in the devices.<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td><strong>3) Hijacked devices become botnets<\/strong><\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>In another scenario, your smart home gadgets and router are hijacked and remotely controlled not to install ransomware or steal data from your family, but to use in attacks on others. Typically, they become part of a botnet of controlled machines which are programmed to do the bidding of the hackers. This could range from launching denial-of-service (DoS) attacks on businesses to illegally mining for crypto-currency.<\/p>\n<p>The most famous example of this kind of attack came in 2016, when <a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/tag\/mirai\/\">the Mirai campaign<\/a> managed to hijack tens of thousands of IoT devices by scanning for any exposed to the internet and protected only with factory default passwords. In an <a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/internet-things-ecosystem-broken-fix\/\">infamous attack<\/a>, it managed to take out a key online provider, resulting in outages at some of the biggest sites on the internet, including Twitter and Netflix.<\/p>\n<p><strong>What to do next<\/strong><\/p>\n<p>All that said, there are some simple steps you can take today to help reduce your exposure to IoT threats. It should begin with taking time out to understand how your devices work. Are they password protected? How are they updated? Are they running unnecessary services which may expose them to attackers? A bit of research before you buy and install them will also go a long way to keeping you safe.<\/p>\n<p>Here are a few best practice tips to get you started:<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>Change factory default passwords to strong and unique credentials.<\/li>\n<li>Switch on two-factor authentication for even more log-in protection, if offered.<\/li>\n<li>Regularly check for firmware updates and apply as soon as they\u2019re available. This may require you to visit the manufacturer\u2019s website from time-to-time.<\/li>\n<li>Use WPA2 on your routers for encrypted Wi-Fi.<\/li>\n<li>Disable UPnP and any remote management features.<\/li>\n<li>Set up a guest network on your router, which will help protect your main network, its devices and data, from network worms and other malware inadvertently introduced by guests.<\/li>\n<li>Protect your computers and smartphones with AV and only download legitimate smart home apps.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>How Trend Micro can help<\/strong><\/p>\n<p>Trend Micro is here to offer you peace-of-mind when it comes to protecting your smart home. The first step is diagnostic: download our <a href=\"https:\/\/www.trendmicro.com\/en_us\/forHome\/products\/housecall\/home-networks.html\">Housecall<img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/11.2.0\/72x72\/2122.png\" alt=\"\u2122\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/> for Home Networks<\/a> tool to check your network. It will run a comprehensive scan on all your smart home gadgets, highlighting any vulnerabilities and other risks, and providing helpful advice for keeping your network and devices secure.<\/p>\n<p>Next up, install <a href=\"https:\/\/go2.trendmicro.com\/geoip\/home-network-security\">Trend Micro Home Network Security<\/a> (HNS) for comprehensive protection on all your home devices. It blocks dangerous file downloads and malicious websites, protects your personal\/financial data from theft, and will keep ransomware, phishing and other threats at bay. HNS provides instant threat notifications, lets you disconnect any unwanted devices from your network, and offers full control over your devices from your Android or iOS smartphone with the paired HNS monitoring app.<\/p>\n<p>Watch our <a href=\"https:\/\/www.youtube.com\/watch?v=lyJcbscIKLI&amp;list=PLZm70v-MT4JqxWjkHqajtM4do9UoORB0M\">Trend Micro Home Network Security videos<\/a> to find out more about how HNS helps protect your network.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/keep-your-smart-home-safe-heres-what-you-can-do-today-to-secure-your-products\/\">Keep Your Smart Home Safe: Here\u2019s What You Can Do Today to Secure Your Products<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/keep-your-smart-home-safe-heres-what-you-can-do-today-to-secure-your-products\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Trend Micro| Date: Wed, 22 May 2019 12:59:05 +0000<\/strong><\/p>\n<p>The Internet of Things (IoT) is transforming the way we live, work and play. You can find it in the fitness trackers you might be wearing to monitor step count and heart rate. Or the car you may be driving. But more than anywhere else, you\u2019ll see IoT at home in an increasing array of&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/keep-your-smart-home-safe-heres-what-you-can-do-today-to-secure-your-products\/\">Keep Your Smart Home Safe: Here\u2019s What You Can Do Today to Secure Your Products<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[10789,21841,21842,21843],"class_list":["post-15368","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-consumer","tag-home-network-protection","tag-home-networks","tag-smart-homes"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15368","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15368"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15368\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15368"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15368"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15368"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}