Ahead of the holiday shopping bonanza, the security community is talking to consumers about IoT security.
With the holiday shopping season poised to officially kick off this weekend, itâs likely that connected gadgets and toys are high atop many a consumer wish-list. As those of us in the security space know, however, internet of things (IoT) devices can quickly go from fun to creepy, depending on how hackable they are.
IoT devices are set to be among the most popular this year â according to Mozilla, itâs a varied bunch ranging from the Nintendo Switch gaming console and the latest Roku streaming box to Fitbits and assorted drones, smart watches, home assistants and even a smart dinosaur. And with rafts of vulnerabilities continuing to be uncovered in a space plagued by a lack of security wherewithal, many in the security and privacy space have stepped up to the plate with efforts to educate the average citizen about IoT risk.
Ken Munro at PenTest Partners, for instance, is urging consumers to take things into their own hands â or handsets, rather. Evaluating the privacy and security of these devices isnât that tough, he noted â a simple Google search is a perfect place to start.
âPop the name of the smart gadget or toy in to a search engine and add the word âhackâ, âsecurityâ or âvulnerability,’â he explained in a shopper-focused posting on the subject. âItâll take you moments with a smartphone and might save you throwing that âthingâ away later over security concerns. See what comes up â if there are discussions about serious security issues, donât buy it.â
Most IoT vulnerabilities open the door to surveillance, after all: That can be for simple financial spying or for more nefarious purposes. For instance, a line of kidsâ wristwatches was recently found to have a deeply disturbing flaw that would allow someone to track childrenâs real-time GPS coordinates; call kids on their watches; eavesdrop on their conversations; and intercept personal information about them, such as name, age and gender.
So, noting whether oneâs IoT gadget of choice has a microphone, speaker or camera can also help consumers deduce how risky it is, he added.
Also, Munro noted that those shoppers feeling un-lazy can also go the extra mile to test-drive the mobile app that comes with a connected stocking stuffer.
âBefore you buy, download their app from the App Store or Play Store to your phone,â said Munro. âClick on the âcreate accountâ or âloginâ section. Create an account â add a temporary or throwaway email address then try to set the password of âpasswordâ. See what happens. Was it rejected for being too weak? If so, try âPassword1â and see if that works. Most times, that will work. If so, the manufacturer is showing that they really donât care.â
And, users can go so far as to read the manufacturerâs security notices (do they sound legitimate? Do they mention security at all in the first place?) or peruse the online ownerâs manual, which should discuss connecting to the smart thing for the first time. If the WiFi or Bluetooth connection doesnât require a password, thatâs a giant red flag.
Mozilla is doing its part on the consumer education front as well, by updating its âPrivacy not includedâ website. This offers an emoji-based creepiness scale for 70 of the most popular IoT products, along with more in-depth information on each.
Some get the designation of âsuper-creepy,â such as the Amazon Echo and Spot. These home hubs can show you things while it talks to you. âShow and Spot can show the lyrics to the song youâre listening to, weather forecasts, your security cams and baby monitor,â the guide notes. âYou can also make video calls to other people with a Show or Spot. Now you donât just get to wonder if Alexa is listening to you, you get to wonder if sheâs watching as well.â
On the other side of the spectrum, where the happy emojis are, are things like the handheld Nintendo Switch. Itâs a âa handy little console that lets you play at home on your TV or toss it in your bag to play anywhere,â Mozilla said. âGood guy Nintendo also puts a lot of emphasis on easy-to-use parental controls.â
The Switch is one of 32 products that were awarded a badge for meeting the minimum security standards created by Mozilla, Internet Society and Consumer International. To receive a badge, products must use encryption; have automatic security updates; manage security vulnerabilities using tools like bug bounty programs and clear points of contact; and require users to change the default password if a password is required. Other products receiving a badge included Google Home, Harry Potter Kano Coding Kit, Athena Safety Wearable, and the Behmor Brewer Coffee Maker.
Also on the take-consumers-by-the-shoulders-and-shake front, the Internet Society has released a video spoofing the home-shopping channel QVC about the dangers of internet-connected devices, using a fictitious baby monitor called Buggle Baby.
These types of ratings and consumer-awareness efforts will continue to be important as regulations and government action continues to lag, pointed out Munro. However, there are some changes, along with potential legal action, coming that may improve the IoT security landscape sooner rather than later.
For instance, Californiaâs Information Privacy: Connected Devices legislation (SB-327 and AB-1906), set to go into effect in January of 2020, was signed into law on September 28 and is the first law in the nation to address IoT security.
The law requires devices that âare capable of connecting to the Internet âdirectly or indirectlyâ via Internet Protocol (IP) or Bluetooth addresses to have âreasonableâ security controls. The law states that devices must have âa reasonable security feature or features that are appropriate to the nature and function of the device, appropriate to the information it may collect, contain, or transmit, and designed to protect the device and any information contained therein from unauthorized access, destruction, use, modification, or disclosure.â
The law further stipulates that the manufacturer must provide a security feature âthat requires a user to generate a new means of authentication before access is granted to the device for the first time,â to add another layer of security for these devices.