Cybernews
  • News
  • Editorial
  • Security
  • Privacy
    • What is a VPN?
    • What is malware?
    • How safe are password managers?
    • Are VPNs legal?
    • More resources
    • Strong password generator
    • Personal data leak checker
    • Antivirus software
    • Best VPN services
    • Password managers
    • Secure email providers
    • Best website builders
    • Best web hosting services
  • Follow
    • Twitter
    • Facebook
    • YouTube
    • Linkedin
    • Flipboard
    • Newsletter

© 2021 CyberNews - Latest tech news, product reviews, and analyses.

Our readers help us create quality content. If you purchase via links on our site, we may receive affiliate commissions. Learn more

Home » Security » Your IoT device is one of your biggest cybersecurity risks

Your IoT device is one of your biggest cybersecurity risks

by Chris Stokel-Walker
6 November 2020
in Security
0
Nokia sign on building at night

© Shutterstock

96
SHARES

The tech revolution means that we’re more connected to the internet in more ways than ever. It’s not just smart speakers that are trying to use data and cloud connections to servers to try and improve our lives; toasters, refrigerators and cookers are also now “smart”. 

But with that increased interconnectedness, and the rise of the internet of things (IoT), come major risks. A lack of adequate protection for smart devices, and the rise of canny cyber criminals who are willing and able to take advantage, means we’re at risk of being hacked through more than our phones, laptops and desktops nowadays.

IoT devices make up a third of all the infected devices scanned by Nokia Threat Intelligence.

That figure is alarming enough before you consider that it was just 16% last year. The proportion of IoT devices that have been co-opted by criminals into being used as part of a botnet, or siphoning off a user’s personal data, has doubled in just 12 months. 

A major risk for IoT devices

“The Nokia Threat Report is a welcome confirmation for security professionals that mobile platforms are not something that can be disregarded as a risk,” says Boris Cipot, senior security engineer at Synopsys. “If we think about it, today we have more processing power and memory in our smartphones than we did just a few years ago on our laptops and desktops.”

Part of the problem is that we’ve adapted how we use the internet, and smart cyber criminals looking to cash in on taking advantage of us are simply adapting their attacks to respond to our usage patterns.

“Most individuals now jump on their phones or tablet to browse the internet or read their emails. Use cases have shifted from traditional desktop/laptop to mobile device and as such, it is normal that cyberthreats have followed this trend,”

says Cipot.

Nokia’s analysis was conducted on more than 150 million internet-connected devices worldwide, focusing on those that use Nokia’s NetGuard Endpoint Security product.  

“The sweeping changes that are taking place in the 5G ecosystem, with even more 5G networks being deployed around the world as we move to 2021, open ample opportunities for malicious actors to take advantage of vulnerabilities in IoT devices,” says Bhaskar Gorti, Nokia Software President and Chief Digital Officer. “This report reinforces not only the critical need for consumers and enterprises to step up their own cyber protection practices, but for IoT device producers to do the same.”

Pay attention to all the risks, not just one area

The risk is that end users are only aware of the latest threat, and don’t take into consideration all the concerns that they should have as a whole. For years we’ve been told to bolster defences on our PCs, and let criminals run roughshod over our phones. When we move to tightening up security there, they move to IoT devices.

The fear now is that, knowing we’re focused on IoT alone, the criminals may now move back to more traditional areas of vulnerability for end users.

“Nevertheless, that is not to say that individuals should disregard standard PC threats,” says Cipot. “While mobile threats are rising, this does not imply that PC threats are decreasing. On the contrary, these threats are growing in number too.”

For that reason, it’s important not only to consider a single area of vulnerability that could be exploited by bad actors, but to think about your entire online and internet-connected presence as a holistic whole. The latest data shows a significant, growing risk with IoT devices falling foul of cyberattacks. But it’s important to not be reactive, but instead proactive, in securing your defences.

Share96TweetShareShare
Next Post
what is tor over vpn

Tor over VPN: Is it useful if you're not a whistleblower?

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Editor's choice

One of the biggest Android VPNs hacked? Data of 21 million users from 3 Android VPNs put for sale online
Security

One of the biggest Android VPNs hacked? Data of 21 million users from 3 Android VPNs put for sale online

by CyberNews Team
26 February 2021
4

A user on a popular hacker forum is selling three databases that purportedly contain user credentials and device data stolen...

Read more
A blast from the past: the finest retro PCs people use

A blast from the past: the finest retro PCs people use

26 February 2021
How this IMDb flaw gave me credit for working on Chernobyl, GOT, and other gigs

How this IMDb flaw gave me credit for working on Chernobyl, GOT, and other gigs

25 February 2021
Forget Bruce Willis. AI will protect us from killer asteroids instead

Forget Bruce Willis. AI will protect us from killer asteroids instead

24 February 2021
COMb data leak - Mother of all breaches

COMB: largest breach of all time leaked online with 3.2 billion records

12 February 2021
  • Categories
    • News
    • Editorial
    • Security
    • Privacy
  • Reviews
    • Antivirus Software
    • Password Managers
    • Best VPN Services
    • Secure Email Providers
    • Website Builders
    • Best web hosting services
  • Tools
    • Password generator
    • Personal data leak checker
  • Engage
    • About Us
    • Send Us a Tip
    • Careers
  • Twitter
  • Facebook
  • YouTube
  • Linkedin
  • Flipboard
  • Newsletter
  • About Us
  • Contact
  • Send Us a Tip
  • Privacy Policy
  • Terms & Conditions
  • Vulnerability Disclosure

© 2021 CyberNews - Latest tech news, product reviews, and analyses.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.

Home

News

Editorial

Security

Privacy

Resources

  • About Us
  • Contact
  • Careers
  • Send Us a Tip

© 2020 CyberNews – Latest tech news, product reviews, and analyses.

Subscribe for Security Tips and CyberNews Updates
Email address is required. Provided email address is not valid. You have been successfully subscribed to our newsletter!