• AI Search
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home General Gaming

HP study: 250 security flaws found in just 10 of the most popular smart home devices

Paul Balo by Paul Balo
August 2, 2014
in Gaming, Research/How to do it, Security, Service news, Software
Share on FacebookShare on Twitter

The promise of the ever-expanding Internet of Things (IoT) brings excitement to many. However, cyber criminals also show interests in it according to a study done by tech giant Hewlett-Packard (HP).

The company’s Fortify application security unit analyzed the ten most popular consumer IoT products available and discovered a staggering 250 different security flaws. The average for each product was found to be 25 vulnerabilities. While HP refrains from explicitly naming the products, a rough classification was given. These products originated from manufacturers of “TVs, webcams, home thermostats, remote power outlets, sprinkler controllers, hubs for controlling multiple devices, door locks, home alarms, scales, and garage door openers.”

In general, these devices usually operate on stripped-down versions of the Linux operating system. Even so, they still share many similar basic security concerns of servers or computers running Linux. The troubling part arises when these devices are not given the same level of security measures as a traditional computer by the builders.

HP’s Fortify unit VP and general manager, Mike Armistead, attributes this problem to manufacturers who are in a haste to release their products without committing to substantial security measures to buffer the devices against basic kinds of attacks.

The situation can escalate when one compromised device overlaps vulnerabilities with another, leading to a chain attack. Remember the notorious Target breach when an attack on the store’s heating and ventilation system led to compromised information on over 70 million customers.

The study also revealed alarming security gaps in today’s IoT devices. A significant number of devices did not require strong passwords, encrypted data while communicating with the Internet or a local network, or even during software update downloads. This puts them at risk of significant cyber threats. Further, nine out of the ten devices collected personal data, such as an email address, home address, name, or date of birth.

The extent of the Internet of Things remains an estimate; however, the research firm Gartner predicts it could encompass 26 billion individual devices by 2020.

As Armistead unquestionably puts it: “For a hacker, that’s a pretty large new target to attack.”

Therefore, consider yourself warned.

source: Arik Hesseldahl/Recode, Techmeme

This article was updated in 2025 to reflect current trends and insights.

Related Posts:

  • Trust in Federal Government Branches Continues to Falter
    White House Announces New Labelling For Reputable IT Gadgets
  • assets_task_01jsp4kgarepk94repqb92cvgn_1745573577_img_0
    The Smart Home Rebellion
  • android
    Google Patches 107 Flaws Including 2 Android Zero-Days
  • google-intel-confidential-computing-more-s.max-2000x2000
    Google Cloud Reported More Than 10 Bugs On Intel’s…
  • 1934304-google-rolls-out-advanced-smart-home-features-in-gemini-app-update
    Gemini Extensions for Google Home Are Available to All Users
  • winUpdate-2
    Microsoft Fixes 77 Vulnerabilities in March Patch Tuesday
  • 633909b1-478e-4792-bf45-85ba6fe3cbcb
    Google AI Agent Big Sleep Finds First Security Flaw…
  • 1200x675_cmsv2_5b73bfac-4817-58b5-a7aa-bc44740daa54-9020980
    DeepSeek AI Soars in Popularity, but Privacy Flaws…

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: cyber fraud
Paul Balo

Paul Balo

Paul Balo is the founder of TechBooky and a highly skilled wireless communications professional with a strong background in cloud computing, offering extensive experience in designing, implementing, and managing wireless communication systems.

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • China Approves First Brain Implant for Commercial Use March 13, 2026
  • Microsoft Pushes AI Adoption in Africa to Counter China’s DeepSeek March 12, 2026
  • Microsoft Fixes 77 Vulnerabilities in March Patch Tuesday March 11, 2026
  • Meta Rolls out New Features for Scam Protection March 11, 2026
  • Zoom Unveils AI Office Suite With Avatars Arriving This Month March 11, 2026
  • Adobe Adds AI Assistant To Photoshop; Firefly Gets New Editing Tools March 11, 2026
  • OpenAI GPT-5.4 Outperforms Humans in Desktop Navigation Tests March 11, 2026
  • OpenAI Plans To Integrate Sora Video AI Into ChatGPT March 11, 2026
  • Google Updates Workspace Apps With New Gemini Capabilities March 11, 2026
  • Meta acquires AI Agent Social Network Moltbook to Expand AI Ambitions March 10, 2026
  • What makes an enterprise IoT platform scalable in practice: governance, device lifecycle, and deployment flexibility March 10, 2026
  • Yann LeCun’s New Startup AMI Raises $1 Billion to Build ‘World Model’ AI March 10, 2026

Browse Archives

March 2026
MTWTFSS
 1
2345678
9101112131415
16171819202122
23242526272829
3031 
« Feb    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • AI Search
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.