{"id":36980,"date":"2023-10-20T14:47:21","date_gmt":"2023-10-20T14:47:21","guid":{"rendered":"http:\/\/startupsmart.test\/2023\/10\/20\/the-security-risks-of-the-internet-of-things-startupsmart\/"},"modified":"2023-10-20T14:47:21","modified_gmt":"2023-10-20T14:47:21","slug":"the-security-risks-of-the-internet-of-things-startupsmart","status":"publish","type":"post","link":"https:\/\/www.startupsmart.com.au\/uncategorized\/the-security-risks-of-the-internet-of-things-startupsmart\/","title":{"rendered":"The security risks of the Internet of Things – StartupSmart"},"content":{"rendered":"
By\u00a0Patryk Szewczyk\u00a0and\u00a0Nikolai Hampton<\/em><\/p>\n The range and number of \u201cthings\u201d connected to the internet is truly astounding, including security cameras, ovens, alarm systems, baby monitors and cars. They\u2019re are all going online, so they can be remotely monitored and controlled over the internet.<\/p>\n Internet of Things (IoT) devices typically incorporate sensors, switches and logging capabilities that collect and transmit data across the internet.<\/p>\n Some devices may be used for monitoring, using the internet to provide real-time status updates. Devices like air conditioners or door locks allow you to interact and control them remotely.<\/p>\n Most people have a limited understanding of the security and privacy implications of IoT devices. Manufacturers who are first-to-market are rewarded for developing cheap devices and new features with little regard for security or privacy.<\/p>\n At the heart of all IoT devices is the embedded firmware. This is the operating system that provides the controls and functions to the device.<\/p>\n Our previous research on internet device firmware demonstrated that even the largest manufacturers of broadband routers frequently used insecure and vulnerable firmware components.<\/p>\n IoT risks are compounded by their highly connected and accessible nature. So, in addition to suffering from similar concerns as broadband routers, IoT devices need to be protected against a wider range of active<\/em> and passive<\/em> threats.<\/p>\n Poorly secured smart devices are a serious threat to the security of your network, whether that\u2019s at home or at work. Because IoT devices are often connected to your network, they are situated where they can access and monitor other network equipment.<\/p>\n This connectivity could allow attackers to use a compromised IoT device to bypass your network security settings and launch attacks against other network equipment as if it was \u201cfrom the inside\u201d.<\/p>\n Many network-connected devices employ default passwords and have limited security controls, so anyone who can find an insecure device online can access it. Recently, security researchers even managed to hack a car<\/a>, which relied on readily accessible (and predictable) Vehicle Identification Numbers (VINs) as its only security.<\/p>\nActive IoT threats<\/h3>\n