Source: HDS. Yoshida. |
"In 2016 the IoT achieved significant mindshare, with many people now aware of the promise of a connected home," said Adam Judd, VP for Asia Pacific Japan, Brocade. "But unfortunately, some of the early adopters in 2016 also learned a painful lesson about the need for standardisation and open platforms. As some vendors with proprietary cloud-based platforms went out of business or changed business models, users were left stranded.
![]() |
Source: Brocade. Judd. |
![]() |
Source: Zebra Technologies. Goh. |
"Internal Zebra research of Zebra enterprise mobile computing deployments identified that a single device failure can result in up to 80 minutes of lost productivity. Implementing comprehensive management on these devices will provide actionable insights to make intelligent decisions to stem a problem before it starts."
![]() |
Source: Software AG. Schulz. |
2017 will mainly be about securing the IoT
The biggest issue for IoT, security, got serious attention in 2016, especially after well-publicised breaches in the US with Dyn and even in Singapore with when StarHub services went down in October.
StarHub even announced in late October that it would help customers address affected devices. "To further safeguard our network and our customers from cyber attacks, we are scheduling home visits to customers whose home Internet-connected devices were likely accessed without their knowledge during the 22 October and 24 October 2016 distributed denial of service (DDoS) attacks on our home broadband domain name servers (DNS). We would like to thank customers for their cooperation," the company said in a statement dated October 28.
"The Dyn attack in October disrupted an array of the Internet’s biggest websites and Singapore’s broadband service – demonstrating the vast number of IoT devices that don’t have security on them and are tremendously vulnerable to attacks," noted Symantec security experts. "As more IoT devices are installed in the mass market, the risk of security breach will increase. Once insecure devices are in the market, it becomes almost impossible to fix the issue without recalling them or issuing security updates...Given that this lack of security will continue for the foreseeable future, the number of IoT attacks will only increase as well.
"Beyond looking simply at computers and mobile devices for vulnerabilities, incident response teams will need to consider thermostats and other connected devices as jumping points into the network. Similar to how printer servers were used for attacks several years ago, nearly everything in an enterprise is now connected to the Internet and will need to be protected."
Source: Hillstone Networks. Liu. |
"As the quantities and variety of IoT devices will eventually surpass computers and mobile phones, we will see greater security incidents, and hackers leveraging unique capabilities of devices for their financial gain," added Tim Liu, CTO, Hillstone Networks.
Source: Darktrace. Aurora. |
“These attacks used IoT devices as stepping stones, from which to jump to more interesting areas of the network. However, sometimes the target is the device itself. One of the most shocking threats that we saw was when the fingerprint scanner that controlled the entrance to a major manufacturing plant was compromised – attackers were caught in the process of changing biometric data with their own fingerprints to gain physical access.
"In another attack, the videoconferencing unit at a sports company was hacked, and audio files were being transferred back to an unknown server in another continent. Want to be a fly on the wall in a FTSE100 company’s boardroom? Try hacking the video camera.”
Source: Gemalto. Tay. |
"We expect to see hackers continue to exploit IoT device vulnerabilities to launch attacks, and they will likely use (devices like) Edwin, the app-connected smart duck," said Naveen Bhat, MD, Ixia, suggesting that such devices could be the biggest security threat of the year.
Source: Sophos. Jakobsen. |
Jakobsen also touched on the threat that insecure home IoT devices pose. "Once attackers 'own' a device on a home network, they can compromise other devices, such as laptops containing important personal data. We expect to see more of this as well as more attacks that use cameras and microphones to spy on households. Cyber criminals always find a way to profit,” he said.
It does not help that IoT device manufacturers are likely to continue making unsecured devices. Kaspersky Lab expects vigilante hackers to take a statement by making such devices inoperable, or 'bricked', turning the Internet of Things into the Internet of Bricks.
“As IoT botnets continue to cause DDoS and spam distribution headaches, the ecosystem’s immune response may very well take to disabling these devices altogether, to the chagrin of consumers and manufacturers alike. The Internet of Bricks may very well be upon us,” said Costin Raiu, Director of the Global Research and Analysis Team (GreAT) at Kaspersky Lab and Juan AndrĂ©s Guerrero-Saade, Senior Security Researcher, Kaspersky Lab's GreAT.
Source: Trend Micro. Siah. |
“Enterprises alike need to understand the value that smart devices bring to attackers when taken hostage. A survey undertaken by Trend Micro found that over half of the survey respondents from respective organisations have yet to instil greater security measures for their current infrastructures – that brings to concern on the need to catch up to current and future threats.”
The scenario of insecure IoT devices could play out in other ways. The FortiGuard Labs threat research team warns that if IoT manufacturers fail to better secure their devices, consumers might hesitate to buy them out of cybersecurity fears, with a devastating impact on the digital economy. "We will see an increase in the call to action from consumers, vendors and other interest groups for the creation and enforcement of security standards so that device manufacturers are held accountable for their device’s behaviors out in the wild," said researchers from Fortinet's cyber security intelligence arm.
![]() |
Source: Juniper Networks. Shi. |
![]() |
Source: Ixia. Bhat. |
Interested?
Read the TechTrade Asia blog post on the bigger picture for security in 2017
No comments:
Post a Comment