{"id":16231,"date":"2019-09-04T08:00:03","date_gmt":"2019-09-04T16:00:03","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/09\/04\/news-9973\/"},"modified":"2019-09-04T08:00:03","modified_gmt":"2019-09-04T16:00:03","slug":"news-9973","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/09\/04\/news-9973\/","title":{"rendered":"Finding a Better Route to Router and Home Network Security"},"content":{"rendered":"<p><strong>Credit to Author: Trend Micro| Date: Wed, 04 Sep 2019 14:05:00 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/08\/home-mother-daughter-tablet_GettyImages_186422816-300x200.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" link_thumbnail=\"\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/08\/home-mother-daughter-tablet_GettyImages_186422816-300x200.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/08\/home-mother-daughter-tablet_GettyImages_186422816-768x511.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/08\/home-mother-daughter-tablet_GettyImages_186422816-1024x682.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/08\/home-mother-daughter-tablet_GettyImages_186422816-640x426.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/08\/home-mother-daughter-tablet_GettyImages_186422816-900x599.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/08\/home-mother-daughter-tablet_GettyImages_186422816-440x293.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/08\/home-mother-daughter-tablet_GettyImages_186422816-380x253.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>When was the last time you looked at your home router? We tend to only notice these magical boxes when something goes wrong. And given that many of us get our router as part of a single broadband box (technically known as a <em>gateway<\/em>, combining modem and router in one device), there\u2019s even less incentive to peek under the covers and get familiar with the technology. Yet as our main link to the internet, either by Ethernet cable or Wi-Fi, routers play an absolutely crucial role for us, akin to a cyber front door for the smart home.<\/p>\n<p>There\u2019s just one problem: hackers know this and they\u2019re becoming increasingly adept at exploiting any security weaknesses on these devices to grab our data, install malware, and remotely control our smart devices.<\/p>\n<p><a href=\"https:\/\/www.consumerreports.org\/wireless-routers\/wireless-routers-lack-basic-security-protections\/\">New research published by <em>Consumer Reports<\/em><\/a> reveals that many of the home routers sold in the US today are still missing basic protections. It\u2019s time we got to grips with our routers (or the routers in our gateways), and took proactive steps to protect the smart home.<\/p>\n<p><strong>The gateway to your smart home<\/strong><\/p>\n<p>There was a time when the router simply provided an internet connection for your home PC, your laptop and\/or your mobile devices, assigning an identity (an IP address) to each to enable their connections. Things have since become a lot more complicated. With the advent of the Internet of Things (IoT), <a href=\"https:\/\/www.businesswire.com\/news\/home\/20180326005634\/en\/One-Third-Consumers-Smart-Home-Devices\">over a quarter<\/a> (27%) of US consumers now claim to have three or more smart home devices. These could be anything from smart TVs and speakers to connected baby and home security monitors, to smart door locks and intelligent refrigerators. It\u2019s no surprise that sales of connected home products in the US alone are <a href=\"https:\/\/www.statista.com\/statistics\/525878\/us-connected-home-technologies-sales\/\">estimated to generate<\/a> $5.4 billion in revenue by the end of 2019.<\/p>\n<p>The router is the network hub for all of this connected technology. It\u2019s vitally important to keep it secure because, unlike PCs and mobile devices, smart gadgets don\u2019t have the capacity for anti-malware software to be installed on them. That means if a hacker manages to get inside your virtual smart home via the router, they could have free reign to target these devices.<\/p>\n<p><strong>How is my router exposed to hackers?<\/strong><\/p>\n<p>As mentioned above, according to <a href=\"https:\/\/www.consumerreports.org\/wireless-routers\/wireless-routers-lack-basic-security-protections\/\">the August 2019 research from <em>Consumer Reports<\/em>,<\/a> multiple router models are still failing on security. The non-profit testing body screened for around 60 different indicators of good security and privacy practice. Here\u2019s a brief list of common failings:<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>Eleven of the router models tested accept very weak passwords. These would make it easy for malware <a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/tag\/mirai\/\">like Mirai<\/a> to search for exposed devices online and then crack them open. One router even prevented users from changing its default log-ins of \u201cadmin\u201d and \u201cpassword,\u201d making it even easier to hijack.<\/li>\n<li>Around two-thirds of the routers had Universal Plug and Play (UPnP) enabled. This protocol enables devices on the network to discover each other, but it has a history of serious security vulnerabilities.<\/li>\n<li>Eleven of the routers appraised did not support automatic software updates. These are crucial to keeping devices secure from the latest threats, which try to expose emerging vulnerabilities. If security updates aren\u2019t automatic, users may find it hard to apply them, or forget completely, leaving their router exposed indefinitely. A 2018 study by the <a href=\"https:\/\/www.theamericanconsumer.org\/wp-content\/uploads\/2018\/09\/FINAL-Wi-Fi-Router-Vulnerabilities.pdf\">American Consumer Institute<\/a> found that 83% of home routers are vulnerable to attack, primarily because of a lack of firmware updates.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>What attacks are possible via home routers?<\/strong><\/p>\n<p>A vulnerable router means a vulnerable smart home. Attackers can target security deficiencies to: steal your most sensitive data and log-ins; take-over your smart devices and router to launch attacks on others; or even manipulate your home gadgets to compromise the physical security of the building. Here\u2019s a breakdown of those threats:<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>Attacks target the router in order to take control of smart home devices. These can then be recruited into botnets and used to target others with: DDoS (denial of service), spam, click fraud campaigns, or attempts to hijack consumer accounts <em>en masse<\/em> (credential stuffing).<\/li>\n<li>Attacks can change the DNS server your router uses to resolve URLS (websites) into server IP addresses. Your devices can then be redirected to fake but convincing login pages and your credentials and money can be stolen.<\/li>\n<li>Home devices could also be hijacked to illegally mine for crypto-currency, slowing down your network.<\/li>\n<li>Your router itself could be remotely controlled and turned into a botnet for the same purposes as the above.<\/li>\n<li>Attacks could try to compromise smart home systems in order to spy on your family via home security cameras and even unlock smart door and window locks.<\/li>\n<li>Routers are the gateway for your web traffic. By hijacking them, hackers could monitor your emails and browsing history and grab passwords to sensitive accounts like online banking.<\/li>\n<li>If you\u2019re a home worker, there\u2019s even a chance that hackers could grab log-ins to corporate accounts, putting your company\u2019s security at risk.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>How to protect your router<\/strong><\/p>\n<p>Because your router is the hub for the entire smart home, it should be your first port of call when looking to improve home cyber security. Consider the following best practice tips:<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>Change factory default passwords in your router to strong and unique credentials.<\/li>\n<li>Switch on two-factor authentication for even more log-in protection, if offered.<\/li>\n<li>Check regularly for firmware updates and apply them as soon as they\u2019re available. This may require you to visit the manufacturer\u2019s website from time-to-time.<\/li>\n<li>Use WPA2 on your routers for encrypted Wi-Fi.<\/li>\n<li>Disable UPnP and any remote management features.<\/li>\n<li>Set up a guest network for your devices, which isolates harm guests can cause, as well as hackers\u2019 efforts.<\/li>\n<li>Put the router in middle of house if possible, so the signal is not unduly extended to hackers who may be lurking in parked cars outside.<\/li>\n<li>Invest in security for your entire home network from a reputable provider like Trend Micro.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>How Trend Micro can help<\/strong><\/p>\n<p>Trend Micro <a href=\"https:\/\/go2.trendmicro.com\/geoip\/home-networks\">HouseCall for Home Networks<\/a>, a free application available on Windows, Mac, iOS and Android, helps home users who want to know if their home network or connected devices are vulnerable to hacking or network threats. This free app scans your devices, including your router, for known severe vulnerabilities and provides advice to help you mitigate the risk.<\/p>\n<p>In addition, Trend Micro <a href=\"https:\/\/go2.trendmicro.com\/geoip\/home-network-security\">Home Network Security<\/a> (HNS) provides deep protection against network intrusions, web threats and identity theft for every device connected to the home network. It features:<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li><strong>Internal Attack Blocking:<\/strong> HNS scans traffic between the devices in your network and stops them with Intrusion Prevention (IPS). This includes attacks on your router.<\/li>\n<li><strong>Router Access Protection*<\/strong>: HNS helps stop hackers hijacking your router and making changes to important configurations, such as DNS settings, that can leave your network and devices vulnerable. It does this by blocking unauthorized attempts to access the router\u2019s log-in page.<\/li>\n<li><strong>Cyberattack Shield*<\/strong>: HNS deploys emergency security from the cloud in the case of a global threat outbreak, which could spread ransomware to your router and network or turn your devices into botnets.<\/li>\n<li><strong>Vulnerability Check:<\/strong> Scans your router and devices for any known flaws or vulnerabilities that could be used as entry points for hackers and provides guidance to help you resolve the issues, which may include firmware updates.<\/li>\n<li><strong>Password Check:<\/strong> HNS also scans for weak or default router and device passwords to ensure your devices aren\u2019t exposed to attack.<\/li>\n<li><strong>Dangerous Website and File Blocking:<\/strong> Blocks malicious websites and files to protect your personal and financial data from hacking, phishing, ransomware, and risky remote connections. Scans potentially executable PDFs and EXEs in the cloud for malware before they are downloaded to your devices.<\/li>\n<li><strong>Smartphone app:<\/strong> features an easy-to-use app to make changes and get notifications and updates straight to your mobile phone.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>* Note: These features are available through the Early Access Program for those who wish to be the first to try the latest protections from Home Network Security.<\/p>\n<p><em>To find out more about securing your smart home, go to <a href=\"https:\/\/go2.trendmicro.com\/geoip\/home-networks\">Trend Micro Housecall for Home Networks<\/a> and \u00a0<a href=\"https:\/\/go2.trendmicro.com\/geoip\/home-network-security\">Trend Micro Home Network Security.<\/a><\/em><\/p>\n<p><em>Watch our <a href=\"https:\/\/www.youtube.com\/watch?v=lyJcbscIKLI&amp;list=PLZm70v-MT4JqxWjkHqajtM4do9UoORB0M\">Trend Micro Home Network Security<\/a> YouTube videos for easy-to-understand snapshots showing how HNS works.<\/em><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/finding-a-better-route-to-router-and-home-network-security\/\">Finding a Better Route to Router and Home Network Security<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/finding-a-better-route-to-router-and-home-network-security\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Trend Micro| Date: Wed, 04 Sep 2019 14:05:00 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/08\/home-mother-daughter-tablet_GettyImages_186422816-300x200.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" link_thumbnail=\"\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/08\/home-mother-daughter-tablet_GettyImages_186422816-300x200.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/08\/home-mother-daughter-tablet_GettyImages_186422816-768x511.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/08\/home-mother-daughter-tablet_GettyImages_186422816-1024x682.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/08\/home-mother-daughter-tablet_GettyImages_186422816-640x426.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/08\/home-mother-daughter-tablet_GettyImages_186422816-900x599.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/08\/home-mother-daughter-tablet_GettyImages_186422816-440x293.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/08\/home-mother-daughter-tablet_GettyImages_186422816-380x253.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>When was the last time you looked at your home router? We tend to only notice these magical boxes when something goes wrong. And given that many of us get our router as part of a single broadband box (technically known as a gateway, combining modem and router in one device), there\u2019s even less incentive&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/finding-a-better-route-to-router-and-home-network-security\/\">Finding a Better Route to Router and Home Network Security<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[10789,13134],"class_list":["post-16231","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-consumer","tag-internet-protection"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16231","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16231"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16231\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16231"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16231"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16231"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}