News by Topic
- Search Marketing
- Email Marketing
- Loyalty Marketing
- Mobile Marketing
- Social Marketing
- Viral Marketing
- Trends & Ideas
- Internet Marketing 101
Study reveals the privacy issues behind the Internet of Things
A worryingly high percentage of Internet of Things devices have security vulnerabilities that, instead of making life easier, could cause more problems than they are worth.
Hewlett-Packard's Fortify on Demand division has released its first 'Internet of Things State of the Union Report' and, for those intending to implement such devices into their lives it is scary reading.
HP investigated ten of the most popular Internet of Things devices - door locks, webcams, televisions, alarms, garage openers, power outlets, sprinklers, scales, home thermostats and hubs for controlling multiple devices. They spent three weeks hacking the devices to try to identify weak spots.
The results? Each device was found to have an average of 25 vulnerabilities, the most worrisome being a lack of security. Seventy percent of devices didn't use any kind of encryption, while half of the devices' mobile apps were found to be sending unencrypted communications to the cloud and Web.
Furthermore, 80% of the devices failed to require passwords of sufficient length and complexity making them vulnerable to attack. Sixty percent were identified as having "insecure web interfaces".
According to the report, "A majority of devices along with their cloud and mobile components failed to require passwords of sufficient complexity and length with most allowing passwords such as "1234" or "123456". In fact, many of the accounts we configured with weak passwords were also used on cloud websites as well as the product's mobile application. A strong password policy is Security 101 and most solutions failed."
- Number of Mobile Addicts up 59% YoY
- Massive mobile ad fraud uncovered
- How to ensure accurate reviews are seen
- Brands: Why you need to improve on location
- Top 3 mistakes of app developers
- Social media becoming integral to journalists' daily work
- Emotional motivations for video-sharing differ according to age
- Smartwatches worn for convenience but security remains a concern
Featured White Papers
- The Step-By-Step Guide to Building Your Custom Attribution Model
Solving the attribution problem will be one of the most important things you do to boost ROI for your organization....
- What drives Email Open Rates
eDataSource compares certain quarterly email engagement metrics across five somewhat similar retailers, based on our visibility into the email activity...