Smart home mobile apps vulnerable to takeover

Researchers find that apps to control devices in the home could be easily hacked

An examination of a number of mobile apps to control smart home devices has discovered that the security in place is not good enough to prevent hackers from taking control.

According to research carried out by IT security firm Pradeo Security Systems, 80% of tested applications carry vulnerabilities, with an average of 15 per application. Moreover, 15% of them can lead to a man-in-the-middle attack. Researchers said this was of particular concern as this can lead to an object takeover by a cybercriminal.

Advertisement - Article continues below

The researchers looked at 100 IoT mobile applications (thermostat, electrical blinds, remote control, baby phone) available on Google Play and App Store.

The researchers said that while official stores applications rarely include a malware but they are not necessarily safe. They added that apps analysed by the company are sending the data they handle to 17 servers in average, and 8% of them are transmitting the information to uncertified servers.

"Among these, some have expired and are available for sale. Anyone buying them could access all the data they receive," said Vivian Raoul, CTO of Pradeo Security Systems.

The research also found that 90% of applications leak the data they manipulate. Among these are application file content (81%), hardware information (device manufacturer, commercial name, battery status) (73%), device information (OS version number) (73%).

Advertisement
Advertisement - Article continues below

Raoul said that his firm has notified the IoT device manufacturers about the security problems they are exposed to.

While the number of smart home apps and devices are expanding with more developers getting in on the action, there's clearly a need for security to be seriously considered, otherwise homes and offices could end up with a deluge of potential vulnerabilities on their networks. 

Featured Resources

Top 5 challenges of migrating applications to the cloud

Explore how VMware Cloud on AWS helps to address common cloud migration challenges

Download now

3 reasons why now is the time to rethink your network

Changing requirements call for new solutions

Download now

All-flash buyer’s guide

Tips for evaluating Solid-State Arrays

Download now

Enabling enterprise machine and deep learning with intelligent storage

The power of AI can only be realised through efficient and performant delivery of data

Download now
Advertisement

Recommended

Visit/security/privacy/355005/whos-watching-you-watch-them
privacy

Who’s watching you watch them?

15 Mar 2020
Visit/network-internet/internet-of-things-iot/354408/amazon-apple-and-google-join-forces-on-voice-for
Internet of Things (IoT)

Amazon, Apple and Google join forces on voice for smart homes

19 Dec 2019

Most Popular

Visit/infrastructure/server-storage/355118/hpe-warns-of-critical-bug-that-destroys-ssds-after-40000-hours
Server & storage

HPE warns of 'critical' bug that destroys SSDs after 40,000 hours

26 Mar 2020
Visit/software/video-conferencing/355138/zoom-beaming-ios-user-data-to-facebook-for-targeted-ads
video conferencing

Zoom beams iOS user data to Facebook for targeted ads

27 Mar 2020
Visit/software/355113/companies-offering-free-software-to-fight-covid-19
Software

These are the companies offering free software during the coronavirus crisis

25 Mar 2020
Visit/mobile/mobile-phones/355088/apple-lifts-iphone-purchase-restrictions
Mobile Phones

Apple lifts iPhone purchase restrictions

23 Mar 2020