- Solutions
- Services
- Products
- Integrated Systems
- Software
- Application Lifecycle Management
- Big Data Analytics
- DevOps
- Enterprise Security
- Hybrid and Private Cloud
- Information Governance
- Information Management
- IT Service Management
- Operations Management
- Server Management
- Software as a Service (SaaS)
- Software-Defined Data Center
- Storage Management
- All Software
- Servers
- Storage
- Networking
- About Us
- Support
-
- Solutions
- Services
- Products
- Integrated Systems
- Software
- Application Lifecycle Management
- Big Data Analytics
- DevOps
- Enterprise Security
- Hybrid and Private Cloud
- Information Governance
- Information Management
- IT Service Management
- Operations Management
- Server Management
- Software as a Service (SaaS)
- Software-Defined Data Center
- Storage Management
- All Software
- Servers
- Storage
- Networking
- About Us
- Support
- Community Home
- >
- Software
- >
- Security Products
- >
- HP Study Reveals 70 Percent of Internet of Things ...
-
-
Categories
- Solutions
- IT Transformation
- Topics
- Big Data
- Cloud
- Security
- Infrastructure
- Products
- Cloud
- Integrated Systems
- Networking
- Servers and Operating Systems
- Software
- Services
- Storage
- Company
- Events
- Hewlett Packard Labs
- Partner Certification
- Partner Solutions
- Welcome
- Welcome
- Announcements
- Tips & Tricks
- Feedback
-
Blogs
- All About the Apps
- Alliances
- Around the Storage Block
- Behind the scenes @ Labs
- Big Data
- BriefingsDirect by Dana Gardner
- Business Service Management
- Cloud Source
- Coffee Coaching
- Converged Data Center Infrastructure
- Discover Insider
- Enterprise Services
- Grounded in the Cloud
- HPE Business Insights
- Infrastructure Insights
- IT Service Management
- LoadRunner and Performance Center
- My Learning Certification
- Networking
- OEM Solutions
- Security Products
- Security Research
- Servers: The Right Compute
- Software Developers
- Software Solutions
- Storage Insiders
- Technical Support Services
- Telecom IQ
- Transforming IT
-
Community Knowledge Base
- Application Performance Management
- Application Security Center
- Data Protection
- Functional Testing/QTP Support Forum
- General Software Products
- HPE Anywhere Developer Platform
- HPE Insight Cluster Management Utility (CMU)
- HP Service Manager
- HP-UX
- IT Asset Manager/DDMI
- Data Center Automation Center
- Linux
- LoadRunner / Performance Center
- Microsoft
- Networking
- Network Management Solutions
- OpenVMS
- Operations Orchestration
- Project Portfolio Management
- ProLiant Servers / NetServers
- Quality Center / ALM
- Records Management/HP Records Manager & HP TRIM
- SDN
- Server Automation
- Servers
- Service Test
- Storage
- Systems Management
- Tru64 UNIX
- UCMDB and UD
- Virtualization Knowledge Base
- VMware
-
Quick Links
- Community FAQ
- FAQ - New features
- FAQ - Getting Started
- FAQ - My Settings
- FAQ - Community Basics
- FAQ - Searching
- FAQ - Posting Messages
- FAQ - Twitter
- FAQ - Bookmarks, Subscriptions, and RSS
- FAQ - Knowledge Base
- FAQ - Blogs
- FAQ - Ideas
- FAQ - Images
- FAQ - Accepted Solutions
- FAQ - Kudos
- FAQ - Me Too
- FAQ - Tagging
- FAQ - Private Messenger
- Community Guidelines
- Contact Us
- Getting Started
- Rules of Participation
- Tell us what you think
- HPE Dev Community
- Live Network
- Software Support Online
- HPE Support Center
-
Categories
-
Categories
-
Blogs
- All About the Apps
- Alliances
- Around the Storage Block
- Behind the scenes @ Labs
- Big Data
- BriefingsDirect by Dana Gardner
- Business Service Management
- Cloud Source
- Coffee Coaching
- Converged Data Center Infrastructure
- Discover Insider
- Enterprise Services
- Grounded in the Cloud
- HPE Business Insights
- Infrastructure Insights
-
Community Knowledge Base
- Application Performance Management
- Application Security Center
- Data Protection
- Functional Testing/QTP Support Forum
- General Software Products
- HPE Anywhere Developer Platform
- HPE Insight Cluster Management Utility (CMU)
- HP Service Manager
- HP-UX
- IT Asset Manager/DDMI
- Data Center Automation Center
- Linux
- LoadRunner / Performance Center
- Microsoft
- Networking
- Network Management Solutions
-
Quick Links
- Community FAQ
- FAQ - New features
- FAQ - Getting Started
- FAQ - My Settings
- FAQ - Community Basics
- FAQ - Searching
- FAQ - Posting Messages
- FAQ - Twitter
- FAQ - Bookmarks, Subscriptions, and RSS
English
- Subscribe to RSS Feed
- Mark as New
- Mark as Read
- Bookmark
- Receive email notifications
- Email to a Friend
- Printer Friendly Page
- Report Inappropriate Content
HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack
HP Fortify on Demand is pleased to announce the release of its Internet of Things State of the Union Study, revealing 70 percent of the most commonly used Internet of Things (IoT) devices contain serious vulnerabilities.
Why we did the study
Late last year, we were hearing a lot about Internet of Things, and a bit about IoT security, but had not seen anything that focused on the complete picture of IoT security, i.e. all the various surface areas that represent the IoT ecosystem. So, we decided to start the OWASP Internet of Things Top 10 Project, which aims to educate on the main facets of Internet of Things Security that people should be concerned with.
Then earlier this year, we decided to use that project as a baseline for testing the top 10 IoT devices being used today. We bought them, shipped them to Craig Smith's home lab, and beat up on them for around three weeks.
What we found
On average, 25 vulnerabilities were found per device, totaling 250 vulnerabilities. Highlights include:
- Privacy concerns
- Insufficient authorization
- Lack of transport encryption
- Insecure web interface
- Inadequate software protection
Takeaways
We have a number of things we'd like people to take from the report:
- Internet of Things security is not one-dimensional. You need to look at all the surface areas discussed in the report and in the OWASP Internet of Things Top 10 Project in order to have a complete view of your risk.
- IoT Security is not just a consumer problem. Corporations need to be looking at how their ICS and SCADA systems fare when looked at under a similar light.
- The current state of Internet of Things security seems to take all the vulnerabilities from existing spaces, e.g. network security, application security, mobile security, and Internet-connected devices, and combine them into a new (even more insecure) space, which is troubling.
We hope that this study will help consumers, SMBs, corporations, and manufacturers to gain some level of improved understanding of their risk related to Internet of Things security, and to place some focus on the issues highlighted in the report when making decisions in the future.
A special thanks to Craig Smith on the Fortify on Demand Research Team for spearheading the testing efforts!
Links
:: The Full IoT State of the Union Study
Ping us with any thoughts, questions, or comments.
: :
About HP Fortify on Demand
HP Fortify on Demand is a cloud-based application security solution. We perform multiple types of manual and automated security testing, including web assessments, mobile application assessments, thick client testing, ERP testing, etc.--and we do it both statically and dynamically, both in the cloud and on-premise.
- Back to Blog
- Newer Article
- Older Article
- Back to Blog
- Newer Article
- Older Article
- Subscribe to RSS Feed
- Mark as New
- Mark as Read
- Bookmark
- Receive email notifications
- Email to a Friend
- Printer Friendly Page
- Report Inappropriate Content
-
J Random Entity
on:
Why CISOs don't invest properly in Applicatio
n Sec... -
ElisaLippincott
on:
Making Threat Intelligen
ce Actionable through Unpa... - Marco Schulz on: Top 5 problems with data breach insurance
- CaroleLoomis on: The State of IoT Security (2015)
- AutoDan on: Announcing ShadowOS
- Alireza Ghahrood on: ArcSight Activate Framework - FREE!
- TheAppDefender on: HP Cyber Risk Report 2015: spotlight on the applic...
-
DMSec
on:
IDS Is “Walking” Dead…and a Few Other Observatio
ns... -
Richmond Lock
on:
IoT is the Frankenbea
st of Informatio n Security - TommySteynJhb on: How to talk to a female in InfoSec
-
Application security
(252) -
Big Data Security Analytics
(93) -
Data security and encryption
(13) -
Network security
(255) -
Security events
(119) -
Threat intelligence
(56)
Hewlett Packard Enterprise International
© Copyright 2016 Hewlett Packard Enterprise Development LP

