• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here:Home » IoT : Devices Currently Might Not Provide Adequate Safety

By Abhishek Ghosh August 18, 2014 8:05 am Updated on August 18, 2014

IoT : Devices Currently Might Not Provide Adequate Safety

Advertisement

A recent study carried out by the researchers from HP for checking safety of 10 different categories of objects related to the Internet of Things (IoT), showed how the devices are extremely vulnerable for not following the adequate safety standards. In previously published two articles – Internet of Things, Cloud and Espionage of Safety and Impact IoT (Internet of Things) Will Deliver To the Security Firms, we expressed the concern about security and privacy of the common users.

 

In the published paper, tests involved the most common categories of IoT devices, namely – TVs, webcam, hub for controlling multiple devices, electronic locks, anti-theft systems and systems for automatic opening garage doors and entrance of home.  Each device was connected to its cloud service or a mobile device and was able to control it using specialized applications, in the way they are intended to work.

IoT - Devices Currently Might Not Provide Adequate Safety

 

IoT : Different Devices Is Not Following Adequate Safety Standards

 

The researchers identified 250 vulnerabilities that would allow a potential attacker to act with extreme creativity, ranging from problems related to the privacy of users to flaws in cryptographic protocols and interfaces of the web administration. The methods to upgrade firmware returned some unsafe methods and protection systems for the login credentials were inadequate.

Advertisement

---

The following other main points which emerged from the research:

  1. 6 out of 10 devices using web interfaces which are known to be vulnerable and are not used now
  2. 70% of the devices using network services which are not protected by encrypted protocols, this exposes the devices that connect to cloud services and mobile applications to become Man-in-the-Middle Attack (MITMA)
  3. 80% of the devices used default passwords which are inadequate and easy to guess (1234, 123456, 0000 and so on)
  4. In 60% of the devices a security protocol that secures the connection of the device during the reception of updates is absent. The updated files are kept without any protection

 

IoT Different Devices and Made in China Products

 

So, this is the current situation of the devices which are intended to be used by the consumers, as IoT devices manufactured by so called A Grade brands. It is quite difficult to predict, what can happen with the assumed to be manufactured low cost IoT devices by the new companies which probably will not follow a strict Quality Control checking from the countries like China. China itself is not responsible for the worldwide hatred towards the Made in China products, it is some of the manufactures, who basically catch the consumers with low budget with their inferior products, with some compromise in the typical rules which any manufacturing industry should follow. With these so called “Made in China” IoT devices without proper quality control, it is possible for any third party to run spyware activities.

Tagged With Which of the following is not a concern about IoT , Which of the following is not a concern about IoT?
Facebook Twitter Pinterest

Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to IoT : Devices Currently Might Not Provide Adequate Safety

  • Nginx WordPress Installation Guide (All Steps)

    This is a Full Nginx WordPress Installation Guide With All the Steps, Including Some Optimization and Setup Which is Compatible With WordPress DOT ORG Example Settings For Nginx.

  • WordPress & PHP : Different AdSense Units on Mobile Devices

    Here is How To Serve Different AdSense Units on Mobile Devices on WordPress With PHP. WordPress Has Function Which Can Be Used In Free Way.

  • Arduino and LED Bar Display : Circuit Diagram, Code

    Here is a Guide Explaining the Basics, Circuit Diagram, Code on Arduino and LED Bar Display. LED Bar Display is Actually Like Multiple LED.

  • Changing Data With cURL for OpenStack Swift (HP Cloud CDN)

    Changing Data With cURL For Object is Quite Easy in OpenStack Swift. Here Are Examples With HP Cloud CDN To Make it Clear. Official Examples Are Bad.

performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • Hybrid Multi-Cloud Environments Are Becoming UbiquitousJuly 12, 2023
  • Data Protection on the InternetJuly 12, 2023
  • Basics of BJT TransistorJuly 11, 2023
  • What is Confidential Computing?July 11, 2023
  • How a MOSFET WorksJuly 10, 2023
PC users can consult Corrine Chorney for Security.

Want to know more about us?

Read Notability and Mentions & Our Setup.

Copyright © 2023 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy