itb-au logo
Story image

IoT home connectivity on the up, as are cybersecurity threats

In Oceania, nearly 50% of homes have at least one connected Internet of Things device, while globally this statistic is 40%.

As this number grows the number of security risks also grows, the study from Stanford University and Avast shows.

The new research paper, ‘All Things Considered: An Analysis of IoT Devices on Home Networks’, is the largest global study to date that focuses on IoT devices.

Stanford University assistant professor of computer science Zakir Durumeric says, “The security community has long discussed the problems associated with emerging IoT devices.”

Durumeric says, “Unfortunately, these devices have remained hidden behind home routers and we’ve had little large-scale data on the types of devices deployed in actual homes. This data helps us shed light on the global emergence of IoT and types of the security problems present in the devices real users own.”

The research reveals greater insights into the IoT ecosystem and subsequent cybersecurity challenges in homes across the world.

When it comes to Oceania, 49.2% of homes in Oceania have IoT devices, which places the region slightly behind Western Europe, which is second highest at 53.5%.

Furthermore, 30.7% of homes have media devices, 19.8% have work-related IoT hardware and 10.1% have gaming consoles.

Globally, even with more than 14,000 IoT manufacturers worldwide, 94% of all IoT devices are manufactured by just 100 vendors. According to Avast, this is an opportunity for manufacturers to improve security.

Avast head of AI Rajarshi Gupta says, “A key finding of this paper is that 94% of the home IoT devices were made by fewer than 100 vendors, and half are made by just ten vendors. This puts these manufacturers in a unique position to ensure that consumers have access to devices with strong privacy and security by design.”

By hardening these devices against unwanted access, manufacturers can help prevent bad actors from compromising these devices for spying or denial of service attacks, Avast states.

When it comes to cybersecurity, protocols like FTP and Telnet are still used by millions of devices. In fact, more than 7% of all IoT devices still use these protocols, making them especially vulnerable, according to the study.

This is also the case for 15% of home routers, which act as a gateway into the home network. According to Avast, this is a serious issue as when routers have weak credentials they can open up other devices and potentially homes to an attack.

The research shows that surveillance devices and routers consistently support Telnet protocol. Surveillance devices have the weakest Telnet profile, along with routers and printers. This aligns with historical evidence such as the role of Telnet in the Mirai botnet attacks that suggests these kinds of devices are both numerous and easy to compromise, Avast says.

To complete the research, Avast scanned 83 million IoT devices in 16 million homes worldwide to understand the distribution and security profile of IoT devices by type and manufacturer. The findings were then validated and analysed by research teams at Avast and Stanford University.

Users contributed data to the study using Avast’s Wi-Fi Inspector, which scans home networks for vulnerabilities and identifies potential security issues.

Download image
Your VPN deserves more than a username and password
Are the people logging into your networks who they say they are?More
Link image
Zendesk Showcase: A CX event for these topsy-turvy times
The world is in uncharted territory – there is no blueprint for doing business right now. Each day brings new challenges. Join business leaders to share your thoughts and learn how to thrive in the face of adversity.More
Link image
<span class="coloured">Microsoft 365</span>: More than just a collaboration tool for your remote workers
The world now knows the challenges of remote working in times of crisis. In this on-demand webinar, learn which migration strategy is right for you, and how to get there quickly and efficiently in this on-demand webinar by AvePoint specialists.More
Download image
Strengthen the weakest link in your security chain
Globalisation. Remote working. High-turnover workforces. These factors and more add up to make increasingly dynamic workforces - and without proper management, your business could fall behind.More
Story image
Micro Focus launches solutions designed to aid modernisation
“Through new insight-driven tools, application program interface (API) development capabilities and robust deployment options, these Micro Focus solutions give developers new ways to work with complex COBOL and mainframe systems while delivering on a cloud strategy.”More
Story image
Cohesity named top vendor in unstructured data management.
GigaOm cited Cohesity's end-to-end solution designed to tackle data and app challenges in modern enterprises. More