{"id":29638,"date":"2021-09-06T21:13:43","date_gmt":"2021-09-06T10:13:43","guid":{"rendered":"https:\/\/www.kaspersky.com.au\/blog\/how-to-protect-smart-home-devices\/29638\/"},"modified":"2022-05-05T03:29:07","modified_gmt":"2022-05-04T16:29:07","slug":"how-to-protect-smart-home-devices","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/how-to-protect-smart-home-devices\/29638\/","title":{"rendered":"Protect smart home devices from hacking"},"content":{"rendered":"<p>Smart speakers, autonomous vacuum cleaners, and all sorts of other smart home devices are becoming ever more affordable, and home networks are now capable of hosting dozens of such gadgets. On the one hand, it\u2019s convenient and tech-progressive. On the other hand, the more connected devices in the home, the greater the risk owners face. Having hacked a weak link such as a smart vacuum cleaner or even a <a href=\"https:\/\/www.kaspersky.com\/blog\/leaking-fish-tank\/22248\/\" target=\"_blank\" rel=\"noopener nofollow\">fish tank<\/a>, an attacker can steal confidential data from a computer or smartphone \u2014 anything connected to the same network.<\/p>\n<h2>Fears and dangers<\/h2>\n<p>In the past five years, the number of IoT-related cyberthreats has increased by a factor of 70(!) and continues to grow. That\u2019s not surprising given that smart devices are easy targets for cybercriminals. In fact, 76% of IoT gadgets communicate over unencrypted channels, according to a recent Zscaler <a href=\"https:\/\/www.zscaler.com\/blogs\/security-research\/iot-enterprise-report-empty-office-edition\" target=\"_blank\" rel=\"nofollow noopener\">report<\/a>; and last year, Israeli cybersecurity company JSOF discovered <a href=\"https:\/\/www.kaspersky.com\/blog\/ripple20-vulnerabilities\/35974\/\" target=\"_blank\" rel=\"noopener nofollow\">19 zero-day vulnerabilities<\/a>, some of them critical, in a TCP\/IP library millions of IoT devices use to communicate with the Internet.<\/p>\n<p>We can see another aspect of the problem in the young and rapidly growing connected-device industry, where some vendors take little responsibility for updating firmware. Even the more responsible vendors tend to stop updating their products early on, leaving smart gadgets prone to hacking, as in the case of <a href=\"https:\/\/www.kaspersky.com\/blog\/wd-my-book-remote-wipe\/40392\/\" target=\"_blank\" rel=\"noopener nofollow\">Western Digital\u2019s My Book Live NAS<\/a>, for example.<\/p>\n<p>A Kaspersky study showed that 89% of IoT device owners have security concerns. Here are the most common fears:<\/p>\n<ul>\n<li>A hacked device will infect the entire home network;<\/li>\n<li>Cybercriminals will lock a gadget and demand ransom;<\/li>\n<li>Attackers will spy through a camera or microphone;<\/li>\n<li>A device will malfunction and become bricked.<\/li>\n<\/ul>\n<p>Unfortunately, their fears are well-founded. If you think you are too small a fish to become a target, think again: Cybercriminals often carry out mass attacks, <a href=\"https:\/\/www.kaspersky.com\/blog\/five-most-notorious-cyberattacks\/24506\/\" target=\"_blank\" rel=\"noopener nofollow\">hacking hundreds of thousands of devices indiscriminately<\/a>.<\/p>\n<h2>How to protect your smart home<\/h2>\n<p>The best way to prevent hackers from accessing IoT devices is to install protection on the home router \u2014 that is, between the Internet and connected gadgets. Router-level protection helps by intercepting threats before they get inside the home network. That\u2019s precisely how our new solution for smart homes, Kaspersky Smart Home Security, works. It runs on the home router, and users can manage it through the mobile app. Broadly, here\u2019s what the solution can do.<\/p>\n<h3>Detect vulnerable network ports<\/h3>\n<p>Many IoT device developers leave <a href=\"https:\/\/en.wikipedia.org\/wiki\/Port_(computer_networking)\" target=\"_blank\" rel=\"nofollow noopener\">network ports<\/a> open for connection, and attackers can then exploit those openings to take control of a device. On detecting an open port that poses a risk, Kaspersky Smart Home Security notifies the user and blocks all unauthorized connection attempts.<\/p>\n<h3>Protect against brute-force attacks<\/h3>\n<p>IoT devices are often subjected to <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/brute-force\/\" target=\"_blank\" rel=\"noopener\">brute-force attacks<\/a>. Using specialized search engines, cybercriminals select gadgets with protocols available for connection and automatically brute-force common usernames and passwords. A careful search will always yield a baby monitor or camera whose vendors have set a crackable password.<\/p>\n<p>Kaspersky Smart Home Security monitors unsuccessful connection attempts, and if someone tries to access a device several times in a row, the solution temporarily blocks any further attempts to connect to it.<\/p>\n<h3>Block dangerous links and downloads<\/h3>\n<p>Kaspersky Smart Home Security blocks attempts to download malware to users\u2019 routers and immediately notifies them about the attack.<\/p>\n<p>If a device has been hacked and is trying to connect to a malicious website, Kaspersky Smart Home Security prevents it from doing so. (Rest assured, your smart toaster will not be coopted for a DDoS attack or your speaker used as a surveillance tool.)<\/p>\n<h3>Check password strength<\/h3>\n<p>Password security relies on users having long, complex, and unique passwords \u2014 a tricky set of requirements. In the case of IoT devices, vendors often underestimate the threat and set short, weak passwords.<\/p>\n<p>Cybercriminals are well aware of this tendency, so after every password leak they use compromised credentials to hack IoT devices.<\/p>\n<p>Kaspersky Smart Home Security promptly warns users about unsafe passwords and does not permit the use of leaked credentials.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kpm-download\">\n<h3>Restrict Internet use<\/h3>\n<p>Digital parenting just became a whole lot easier. Users can now create a schedule to manage children\u2019s home Internet use on tablets, TVs, and other smart device, as well as restrict access to unwanted resources.<\/p>\n<h2>How to connect Kaspersky Smart Home Security<\/h2>\n<p>Installing a security solution (or any software) on a router is technically challenging. For this reason, and because most users buy or lease home routers from their Internet service providers anyway, we decided to distribute Kaspersky Smart Home Security through ISPs. If you are interested in the solution, contact your ISP and ask if they offer Kaspersky Smart Home Security.<\/p>\n<p>If you happen to represent an ISP, we invite you to join us in making smart homes safer. Please write to us at vas@kaspersky.com with any questions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Smart devices are easy targets for cybercriminals. Here\u2019s how to protect your smart vacuum cleaner, air conditioner and other connected devices.<\/p>\n","protected":false},"author":2706,"featured_media":29639,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[7],"tags":[658,794,3463,192,660,268],"class_list":{"0":"post-29638","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-products","8":"tag-internet-of-things","9":"tag-iot","10":"tag-kaspersky-smart-home-security","11":"tag-protection","12":"tag-smart-home","13":"tag-vulnerabilities"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/how-to-protect-smart-home-devices\/29638\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/how-to-protect-smart-home-devices\/23252\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/how-to-protect-smart-home-devices\/18739\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/how-to-protect-smart-home-devices\/25304\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/how-to-protect-smart-home-devices\/23374\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/how-to-protect-smart-home-devices\/22767\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/how-to-protect-smart-home-devices\/25938\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/how-to-protect-smart-home-devices\/25457\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/how-to-protect-smart-home-devices\/31414\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/how-to-protect-smart-home-devices\/10002\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/how-to-protect-smart-home-devices\/41617\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/how-to-protect-smart-home-devices\/17585\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/how-to-protect-smart-home-devices\/18073\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/how-to-protect-smart-home-devices\/15226\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/how-to-protect-smart-home-devices\/27277\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/how-to-protect-smart-home-devices\/31569\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/how-to-protect-smart-home-devices\/27493\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/how-to-protect-smart-home-devices\/24298\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/how-to-protect-smart-home-devices\/29431\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/iot\/","name":"IoT"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/29638","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=29638"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/29638\/revisions"}],"predecessor-version":[{"id":30481,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/29638\/revisions\/30481"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/29639"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=29638"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=29638"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=29638"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}