View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Cybersecurity
October 28, 2016

IoT scanner reveals vulnerabilities in IoT connected devices

The scanner will identify vulnerable IoT devices.

By Hannah Williams

European cybersecurity firm BullGuard has developed an Internet of Things scanner which enables users to scan their network to identify if their connected devices are secure, revealing potential weak points.

The company has already scanned a total of over 100,000 unique IPs from consumers using its IoT scanner, showing that the application adds value for home or office users with connected devices.

Hackers have recently been able to obtain access to a wide variety of connected devices, which has prompted new concerns over the security threats of the Internet of Things.

Recently, Dyn was hit by a massive DDoS attack, which left websites such as Twitter and Netflix down for hours. It has been alleged that the attack was executed by a huge sum of devices.

Paul Lipman, CEO of BullGuard said: “We’re fortunate that this incident was benign, but it is a reminder that security cannot be an afterthought in this emerging market.

“Even though the Internet of Things is in its relative infancy, this attack shows how just a small proportion of vulnerable devices can cause concern.”

scannerThe BullGuard scanner is a free application which will compare the user’s public IP address with the listed IP addresses on the Internet of Things search engine, Shodan.

Content from our partners
Unlocking growth through hybrid cloud: 5 key takeaways
How businesses can safeguard themselves on the cyber frontline
How hackers’ tactics are evolving in an increasingly complex landscape

As the company identifies, running a deep scan will enable any open internet facing ports on a user’s network to be added to Shodan.

Lipman added: “We would urge people to be vigilant an take the necessary steps to ensure that basic security measures are in place.”

Sufficiently securing your network can ensure that connected devices remain prevented from malware attacks such as Mirai.

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU