• Archives
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home General Gaming

HP study: 250 security flaws found in just 10 of the most popular smart home devices

Paul Balo by Paul Balo
August 2, 2014
in Gaming, Research/How to do it, Security, Service news, Software
Share on FacebookShare on Twitter

The promise of the ever-expanding Internet of Things (IoT) brings excitement to many. However, cyber criminals also show interests in it according to a study done by tech giant Hewlett-Packard (HP).

The company’s Fortify application security unit analyzed the ten most popular consumer IoT products available and discovered a staggering 250 different security flaws. The average for each product was found to be 25 vulnerabilities. While HP refrains from explicitly naming the products, a rough classification was given. These products originated from manufacturers of “TVs, webcams, home thermostats, remote power outlets, sprinkler controllers, hubs for controlling multiple devices, door locks, home alarms, scales, and garage door openers.”

In general, these devices usually operate on stripped-down versions of the Linux operating system. Even so, they still share many similar basic security concerns of servers or computers running Linux. The troubling part arises when these devices are not given the same level of security measures as a traditional computer by the builders.

HP’s Fortify unit VP and general manager, Mike Armistead, attributes this problem to manufacturers who are in a haste to release their products without committing to substantial security measures to buffer the devices against basic kinds of attacks.

The situation can escalate when one compromised device overlaps vulnerabilities with another, leading to a chain attack. Remember the notorious Target breach when an attack on the store’s heating and ventilation system led to compromised information on over 70 million customers.

The study also revealed alarming security gaps in today’s IoT devices. A significant number of devices did not require strong passwords, encrypted data while communicating with the Internet or a local network, or even during software update downloads. This puts them at risk of significant cyber threats. Further, nine out of the ten devices collected personal data, such as an email address, home address, name, or date of birth.

The extent of the Internet of Things remains an estimate; however, the research firm Gartner predicts it could encompass 26 billion individual devices by 2020.

As Armistead unquestionably puts it: “For a hacker, that’s a pretty large new target to attack.”

Therefore, consider yourself warned.

source: Arik Hesseldahl/Recode, Techmeme

This article was updated in 2025 to reflect current trends and insights.

Related Posts:

  • White House Announces New Labelling For Reputable IT Gadgets
    White House Announces New Labelling For Reputable IT Gadgets
  • assets_task_01jsp4kgarepk94repqb92cvgn_1745573577_img_0
    The Smart Home Rebellion
  • google-intel-confidential-computing-more-s.max-2000×2000
    Google Cloud Reported More Than 10 Bugs On Intel’s…
  • 1934304-google-rolls-out-advanced-smart-home-features-in-gemini-app-update
    Gemini Extensions for Google Home Are Available to All Users
  • 633909b1-478e-4792-bf45-85ba6fe3cbcb
    Google AI Agent Big Sleep Finds First Security Flaw…
  • 1200x675_cmsv2_5b73bfac-4817-58b5-a7aa-bc44740daa54-9020980
    DeepSeek AI Soars in Popularity, but Privacy Flaws…
  • Gemini-Gems-cover
    Google Gemini Advanced Users Can Now Link to GitHub
  • assets_task_01jryze611f7z9hytxfjp2fe9f_img_0
    Transform Your Home on a Budget with Smart Devices…

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: cyber fraud
Paul Balo

Paul Balo

Paul Balo is the founder of TechBooky and a highly skilled wireless communications professional with a strong background in cloud computing, offering extensive experience in designing, implementing, and managing wireless communication systems.

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • Breaking: Google Keeps Chrome, But Judge Orders Search Data Sharing September 2, 2025
  • YouTube Premium Targets Account Sharing, Netflix-Style September 2, 2025
  • Microsoft Fixes Windows Certificate Enrolment Bug September 1, 2025
  • Microsoft to Enforce MFA on Azure Resource Management in October September 1, 2025
  • How to Read Faster: 10 Best Speed Reading Apps in 2025 (Ranked & Reviewed) August 31, 2025
  • WhatsApp Working On Shorter Disappearing Message Timers August 29, 2025

Browse Archives

September 2025
MTWTFSS
1234567
891011121314
15161718192021
22232425262728
2930 
« Aug    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.