Smart Home Hacking

Smart Home Hacking

With the recent launch of Amazon Key the visibility around Smart Homes and IoT Security is an even hotter topic. Insecure IoT devices are helping to create some of the largest botnet networks we have ever seen. These networks are being used to spread malware and create a huge platform for distributed denial-of-service (DDoS) attacks which take down targeted sites and effect many others.

According to a recent research paper by Bern Insight, 55 percent of all houses in North America will have smart home devices. With that in mind here are a few tips to minimize your chances of having your smart home hacked:

  • Always keep your devices installed with the latest updates
  • If multifactor authentication is available, use it
  • Always change default usernames and passwords
  • Put your IoT device on a separate network from your computer
  • Do not use insecure or public WiFi networks with these devices
  • Do not use insecure or public WiFi networks with these devices


If you’re a builder, a breaker, into IoT, or are simply happen to be in the San Francisco area, come say hello to one of our founders  Rob Pope who is speaking on IoT Security at the Smart Home Summit in Palo Alto today!

Tiro Security are a Los Angeles based Information Security company who help businesses protect themselves from cyber security issues by helping build out security programs and providing cyber security professional services. We have performed multiple IoT device penetration tests so if you are in the IOT business and have concerns about your product please contact us.

要查看或添加评论,请登录

Kris'' Rides, CC的更多文章

  • Tackling diversity in InfoSec.... HELP!

    Tackling diversity in InfoSec.... HELP!

    I've been thinking on how we can do our bit on improving diversity in our community. I push for more diversity in the…

    6 条评论
  • Spectre and Meltdown Widespread Hardware Vulnerability

    Spectre and Meltdown Widespread Hardware Vulnerability

    Your computer, your phone, your tablet, your TV server: if it has a computer chip and can be accessed, it is vulnerable…

    2 条评论
  • Clickbait malware sites

    Clickbait malware sites

    “You No Longer Need To Be A Member To Shop In Their Stores” ( 1 ) “NASA Confirms Earth Will Experience 15 Days of…

  • NotPetya: different Ransomware, same solutions.

    NotPetya: different Ransomware, same solutions.

    Another wave of ransomware has been hitting companies, hospitals, airports, banks, and government systems alike around…

  • Cyber Security, small company, big issue.

    Cyber Security, small company, big issue.

    T-Mobile. Home Depot.

  • The Race for Security: Zero Day Exploits

    The Race for Security: Zero Day Exploits

    Our networked systems, be they computers, databases, phones, or other devices, are an endless battlefield. Zero-day…

    1 条评论
  • The Tax Clock is Ticking

    The Tax Clock is Ticking

    Phishing Scams Thrive on Deadlines and Fear! Tax returns are soon due on Tuesday, April 18th, 2017, and with that…

  • Do You Want to Work in Infosec or Win a Nobel Prize for Literature?

    Do You Want to Work in Infosec or Win a Nobel Prize for Literature?

    I’ve come to the realization that we have many budding writers masquerading as Information security professionals out…

    4 条评论
  • Recruiters getting spammed!

    Recruiters getting spammed!

    I know what some of you are thinking, how do you like it now the shoe is on the other foot? Well I don’t but not only…

    4 条评论
  • Free eBook: Beginner’s Guide to Information Security

    Free eBook: Beginner’s Guide to Information Security

    Cyber Security is one of the fastest growing job markets in the world today, though newcomers can find breaking in to…

    1 条评论

社区洞察

其他会员也浏览了