Back

New IoT vulnerabilities allow hackers access to consumers’ personal lives

  • By Elite CIO
  • Date Mar 05, 2019
  • Quotes4

A vulnerability within Box Lock smart padlock enables hackers to unlock the device

A vulnerability within Box Lock smart padlock enables hackers to unlock the device within a few seconds, and a vulnerability within the Mr. Coffee brand coffee maker with Wemo grants hackers access to home networks. As the Internet of Things (IoT) grows and smart devices gain popularity, McAfee warns consumers and businesses alike that cyber criminals will continue to find new ways to exploit all connected things.McAfee is committed to threat research and applauds businesses that quickly re-mediate disclosed vulnerabilities to provide more secure products to their  customers.

“Cyber criminals are relentless,and as long as we continue to connect devices to the internet, they will continue to search for ways to exploit them,” said Raj Samani, McAfee fellow and chief scientist. “Vulnerability disclosures can be frightening for both the consumers using connected devices and the organizations that create them,however, the process is an essential component of creating a safer future.Cyber security researchers, businesses, and consumers working together to expose and eliminate these vulnerabilities keeps us all a step ahead of the bad guys.”

While there is no way to predict the future of IoT attacks, McAfee offers consumers and businesses tips to ensure devices and data are protected from such vulnerabilities:

3 Steps for Consumers to Protect What Matters

·     Set-up a secondary network for your IoT devices that doesn’t share access to your primary network and the devices and data connected thereto

·     Consider getting a router with built-in security features, making it easier to protect all the devices in your home from one access point

·     Set your device to auto-updates so you always have the latest software and be sure to change all default passwords once you purchase a new device

3 Steps for Businesses to Secure Customers

·     Invest in security early in the development of your products and assume that at some point you will run into a vulnerability that needs to be addressed right away. Be sure to constantly monitor products for potential vulnerabilities and access points for cyber criminals

·     Keep all your computers and devices protected by using robust security software that can help safeguard your private information and protect you from threats

·     When faced with a vulnerability, be proactive and transparent in addressing the issue, and engage with the security research team for the fastest path to remediation


Press Release By McAfee