• AI Search
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home General Gaming

HP study: 250 security flaws found in just 10 of the most popular smart home devices

Paul Balo by Paul Balo
August 2, 2014
in Gaming, Research/How to do it, Security, Service news, Software
Share on FacebookShare on Twitter

The promise of the ever-expanding Internet of Things (IoT) brings excitement to many. However, cyber criminals also show interests in it according to a study done by tech giant Hewlett-Packard (HP).

The company’s Fortify application security unit analyzed the ten most popular consumer IoT products available and discovered a staggering 250 different security flaws. The average for each product was found to be 25 vulnerabilities. While HP refrains from explicitly naming the products, a rough classification was given. These products originated from manufacturers of “TVs, webcams, home thermostats, remote power outlets, sprinkler controllers, hubs for controlling multiple devices, door locks, home alarms, scales, and garage door openers.”

In general, these devices usually operate on stripped-down versions of the Linux operating system. Even so, they still share many similar basic security concerns of servers or computers running Linux. The troubling part arises when these devices are not given the same level of security measures as a traditional computer by the builders.

HP’s Fortify unit VP and general manager, Mike Armistead, attributes this problem to manufacturers who are in a haste to release their products without committing to substantial security measures to buffer the devices against basic kinds of attacks.

The situation can escalate when one compromised device overlaps vulnerabilities with another, leading to a chain attack. Remember the notorious Target breach when an attack on the store’s heating and ventilation system led to compromised information on over 70 million customers.

The study also revealed alarming security gaps in today’s IoT devices. A significant number of devices did not require strong passwords, encrypted data while communicating with the Internet or a local network, or even during software update downloads. This puts them at risk of significant cyber threats. Further, nine out of the ten devices collected personal data, such as an email address, home address, name, or date of birth.

The extent of the Internet of Things remains an estimate; however, the research firm Gartner predicts it could encompass 26 billion individual devices by 2020.

As Armistead unquestionably puts it: “For a hacker, that’s a pretty large new target to attack.”

Therefore, consider yourself warned.

source: Arik Hesseldahl/Recode, Techmeme

This article was updated in 2025 to reflect current trends and insights.

Related Posts:

  • Trust in Federal Government Branches Continues to Falter
    White House Announces New Labelling For Reputable IT Gadgets
  • assets_task_01jsp4kgarepk94repqb92cvgn_1745573577_img_0
    The Smart Home Rebellion
  • android
    Google Patches 107 Flaws Including 2 Android Zero-Days
  • google-intel-confidential-computing-more-s.max-2000x2000
    Google Cloud Reported More Than 10 Bugs On Intel’s…
  • 1934304-google-rolls-out-advanced-smart-home-features-in-gemini-app-update
    Gemini Extensions for Google Home Are Available to All Users
  • winUpdate-2
    Microsoft Fixes 77 Vulnerabilities in March Patch Tuesday
  • 633909b1-478e-4792-bf45-85ba6fe3cbcb
    Google AI Agent Big Sleep Finds First Security Flaw…
  • 1200x675_cmsv2_5b73bfac-4817-58b5-a7aa-bc44740daa54-9020980
    DeepSeek AI Soars in Popularity, but Privacy Flaws…

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: cyber fraud
Paul Balo

Paul Balo

Paul Balo is the founder of TechBooky and a highly skilled wireless communications professional with a strong background in cloud computing, offering extensive experience in designing, implementing, and managing wireless communication systems.

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • South Africa Reviews Canal+–MultiChoice Deal Amid Showmax Concerns March 19, 2026
  • Baidu, Tencent Boost AI Push Amid OpenClaw Boom March 19, 2026
  • Researchers Warn DarkSword Exploit Could Hit Millions of iPhones March 18, 2026
  • Tech Giants Join Forces in New Coalition to Tackle Digital Scams March 18, 2026
  • Instagram Rolls Out Eight AI Voice Filters for Voice Messages March 18, 2026
  • Google Brings Gemini Personal Intelligence to Free Users March 17, 2026
  • Microsoft Restructures Copilot Leadership as Suleyman Shifts Focus March 17, 2026
  • OpenAI Launches GPT-5.4 Mini and Nano Models March 17, 2026
  • Samsung to Halt Sales of $2,899 Tri-Fold Phone March 17, 2026
  • Nvidia CloudXR Brings RTX Streaming to Apple Vision Pro March 17, 2026
  • MTN Revenue Jumps 23% on Data and Fintech Growth March 17, 2026
  • Nvidia Unveils AI Data Factory Blueprint for Robotics March 17, 2026

Browse Archives

March 2026
MTWTFSS
 1
2345678
9101112131415
16171819202122
23242526272829
3031 
« Feb    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • AI Search
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.