McAfee Researchers Uncover Two New Vulnerabilities in IoT Devices

286

As the Internet of Things (IoT) grows and smart devices gain popularity, cybercriminals will continue to find new ways to exploit all connected things, warn researchers.

security

Researchers at McAfee, the device-to-cloud cybersecurity company, have discovered two new vulnerabilities within connected devices that allow hackers access to the personal lives of consumers.

They found that a vulnerability within BoxLock smart padlock enables hackers to unlock the device within a few seconds, and a vulnerability within the Mr. Coffee brand coffee maker with Wemo allows hackers access to home networks.

As the Internet of Things (IoT) grows and smart devices gain popularity, cybercriminals will continue to find new ways to exploit all connected things, the company has warned.

McAfee encourages businesses to take quick action to remediate disclosed vulnerabilities to provide more secure products to their customers.

“Cybercriminals are relentless, and as long as we continue to connect devices to the internet, they will continue to search for ways to exploit them,” said Raj Samani, McAfee fellow and chief scientist.

“Vulnerability disclosures can be frightening for both the consumers using connected devices and the organizations that create them, however, the process is an essential component of creating a safer future. Cybersecurity researchers, businesses, and consumers working together to expose and eliminate these vulnerabilities keeps us all a step ahead of the bad guys.”

While there is no way to predict the future of IoT attacks, McAfee has provided some tips to help consumers and businesses protect their devices and data from such vulnerabilities.

Three Steps for Businesses to Secure Customers

  • Invest in security early in the development of your products. Be sure to constantly monitor products for potential vulnerabilities and access points for cybercriminals
  • Keep all your computers and devices protected by using robust security software that can help safeguard your private information and protect you from threats
  • When faced with a vulnerability, be proactive and transparent in addressing the issue, and engage with the security research team for the fastest path to remediation

Three Steps for Consumers to Protect What Matters

  • Set-up a secondary network for your IoT devices that doesn’t share access to your primary network and the devices and data connected thereto
  • Consider getting a router with built-in security features, making it easier to protect all the devices in your home from one access point
  • Set your device to auto-updates so you always have the latest software and be sure to change all default passwords once you purchase a new device

 

Longjam Dineshwori

LEAVE A REPLY

Please enter your comment!
Please enter your name here