HP: 70% of Internet of Things devices vulnerable to attack

Research by HP suggests password security and encryption issues could leave Internet of Things devices vulnerable to attacks.

The internet of things

Seventy per cent of Internet of Things (IoT) devices are vulnerable to security risks, new research from hardware giant HP claims.

HP tested ten devices to see how open they are to security risks and concluded that eight out of ten of the devices would potentially allow hackers to access data, such as the owner's name, email address, home address, date of birth, credit card credentials and health information.

An even higher number (90 per cent) revealed information about the device itself or the cloud or mobile application it was running.

Even devices with a password activated weren't able to stop HP accessing the data. The report said 80 per cent of the devices were easy to guess with many of the IoT devices allowing passwords of no complexity to be set up, such as 1234.

Encryption was another concern. Seventy per cent of the devices tested didn't encrypt information sent over the local network or wider internet, while 60 per cent lacked app encryption for software updates.

HP concluded the reason such devices are left open to security risks is because the demand is so high that manufacturers rush them out to the shelf, without considering the consequences.

Gartner predicts 26 billion IoT devices will be in circulation by 2020. However, HP says manufacturers must consider the security risks associated with distributing them too quickly and whether this will have negative effects for consumers.

Mike Armistead, vice president and general manager of Fortify Enterprise Security Products at HP, said: "With the continued adoption of connected devices, it is more important than ever to build security into these products from the beginning to disrupt the adversary and avoid exposing consumers to serious threats."

Featured Resources

The ultimate law enforcement agency guide to going mobile

Best practices for implementing a mobile device program

Free download

The business value of Red Hat OpenShift

Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShift

Free download

Managing security and risk across the IT supply chain: A practical approach

Best practices for IT supply chain security

Free download

Digital remote monitoring and dispatch services’ impact on edge computing and data centres

Seven trends redefining remote monitoring and field service dispatch service requirements

Free download

Recommended

Inkjet vs Laser printers
Hardware

Inkjet vs Laser printers

1 Oct 2021
Over 90% of IT teams feel pressure to compromise security
Security

Over 90% of IT teams feel pressure to compromise security

9 Sep 2021
HP Q3 revenue misses analyst forecasts
Business operations

HP Q3 revenue misses analyst forecasts

27 Aug 2021
HP buys remote software specialist Teradici
Software

HP buys remote software specialist Teradici

28 Jul 2021

Most Popular

Best Linux distros 2021
operating systems

Best Linux distros 2021

11 Oct 2021
Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans
Laptops

Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans

11 Oct 2021
Windows 11 has problems with Oracle VirtualBox
Microsoft Windows

Windows 11 has problems with Oracle VirtualBox

5 Oct 2021