Smart Home Automation


IoT in your home: what are the risks?

1 September 2018 Smart Home Automation Information Security

Smart homes are getting even smarter, with Internet of Things (IoT) devices rapidly coming to market to make homes more efficient and daily life more convenient. But any Internet connection comes with risk attached, and IoT in homes could increase your vulnerability, warns Fortinet.

IoT takes smart home technology a step further into the future, adding smart sensors and independent Internet connections to appliances and devices to take the task of controlling them out of the hands of their owners. For example, where smart fridges or air conditioners might need to be controlled using a mobile app, an IoT-enabled appliance might control itself without needing the homeowner’s input.

IoT-enabled appliances measure temperature or available light, for example, to automatically trigger an action in an appliance. By using IoT sensors and connected SIMs, manufacturers are now producing heaters and air conditioners that switch on and off to maintain a constant room temperature, lights that switch themselves on when a room is dark, planters that automatically water plants when needed, or door locks that recognise the home owner and unlock without them needing keys.

“IoT-enabled appliances will certainly start arriving in the homes of ordinary South Africans soon,” says Doros Hadjizenonos, regional sales director at Fortinet. “People are already moving to smart homes and embracing devices such as smart TVs and media servers. While these devices make life simpler and easier, the challenge is that not all manufacturers make security their top priority when building smart devices.”

Fortinet’s latest Global Threat Landscape Report found that cyber criminals are already targeting IoT devices and media servers in homes for ‘cryptojacking’, in which they use a device’s computing power to mine cryptocurrency. The report said: “They are an especially attractive target because of their rich source of computational horsepower, which can be used for malicious purposes. Attackers are taking advantage of them by loading malware that is continually mining because these devices are always on and connected. In addition, the interfaces for these devices are being exploited as modified Web browsers, which expands the vulnerabilities and exploit vectors on them.”

“Cryptojacking in itself may not be a direct threat to the owner of the IoT device, although it could make it run slower,” says Hadjizenonos. “But once the code in the home is being controlled by someone else, they could also turn their attention to monitoring personal information on the home network.”

Globally, smart devices such as baby monitors and even smart vacuum cleaners have been hacked in the past, and Hadjizenonos says there is little prevent criminals from stealing passwords, monitoring the movements of homeowners, or tracking their children in future.

“Consumers typically connect their smart appliances via one router, so this is where smart home security efforts should be focused,” he says. “Before investing in smart and IoT-enabled devices, it’s recommended that homeowners ensure that their networks are secure, take advantage of security services from their ISPs, and lock down their routers. Once they invest in smart appliances, they should remember to check regularly for patches and updates to keep these appliances and devices secure.”





Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
SMARTpod talks to Sophos and Phishield
SMART Security Solutions Technews Publishing Sophos Videos Information Security News & Events
SMARTpod recently spoke with Pieter Nel, Sales Director for SADC at Sophos, and Sarel Lamprecht, MD at Phishield, about ransomware and their new cyber insurance partnership.

Read more...
Cybersecurity and insurance partnership for sub-Saharan Africa
Sophos News & Events Information Security Security Services & Risk Management
Sophos and Phishield Announce first-of-its-kind cybersecurity and insurance partnership for sub-Saharan Africa. The SMARTpod podcast, discussing the deal and the state of ransomware in South Africa and globally, is now also available.

Read more...
Corporate and academic teams can register for Kaspersky contest
Kaspersky News & Events Information Security
Kaspersky has announced the registration opening for its new Kaspersky{CTF} (Capture the Flag) competition, inviting academic and corporate teams from around the globe to compete in a battle of skill, strategy and innovation.

Read more...
Continuous security optimisation.
News & Events Information Security
Cymulate has announced its partnership with SentinelOne, a threat exposure validation and AI-powered cybersecurity platform. The collaboration delivers self-healing endpoint security that empowers businesses to increase protection for every endpoint on their network.

Read more...
Protect your smart home devices
Kaspersky IoT & Automation Information Security Smart Home Automation
Voice assistants, kitchen robots, smart lights and many other intelligent devices have become part of our everyday life. However, with the rise of smart technology comes the need for robust protection against potential vulnerabilities.

Read more...
ISPA’s take-down process protects from local scams
News & Events Information Security
During the recent school holidays, parents could rest a little easier knowing that ISPA, SA’s official internet industry representative body, is removing an average of three to four problematic websites from the local internet every week.

Read more...
SA’s strained, loadshedding-prone grid faces cyberthreats
Power Management Information Security
South Africa’s energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis; a wave of cyberthreats that could turn disruptions into catastrophic failures. Attacks are already happening internationally.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved