">
TechMoran
  • About Us
  • Deals
  • Jobs
  • Motoring
    • Money
  • Pitch Your Startup
  • Submit Your Post
  • Freelance Gigs
  • Travel
  • Men’s Corner
  • Dating
Saturday, January 16, 2021
  • Startups
  • Reviews
  • Insider
    • Obituaries
  • Business
  • Women
  • Blockchain
  • Columnists
  • Hacks & Facts
    • How To
  • Editions
    • US Edition
    • India Edition
    • MENA Edition
    • Asia Edition
    • Europe Edition
    • International Edition
No Result
View All Result
TechMoran
">
Home Tech

Secure Your Router from Internet of Things (IOT) Takedowns

Milcah Lukhanyu by Milcah Lukhanyu
4 years ago
in Tech
7 min read
0

 

The Communications Authority (CA) fourth quarter report for 2015-2016, notes Kenya has about 10.8 million broadband internet subscriptions.

This means that slightly over a quarter of Kenyans now connect to the Internet on 3G connections or higher, mostly via affordable smart phones and broadband charges.

On the other end of the spectrum Internet Service providers (ISP) have provided attractive packages to home users on the back of Fiber to Home (FTH) connections, mostly in the urban areas.

Thus, we are witnessing the advent of the so-called Internet of Things (IoT) phenomenon. As technology advances, Kenyans are now adopting and buying vastly interconnected devices for the home, enticed by the prospects of IoT.

Supported by a duplicity of applications and online platforms all accessible and available on a 24/7 basis, examples of these include smart phones, computers, Internet Protocol (IP) security cameras, Video games, smart televisions and digital video recorders (DVRs) among others.

Perhaps second to smart phones, the most universal connectivity device in the home are internet broadband routers. These act as the gateways to whichever ISP network we subscribe to and are necessary for successful signal distribution, making them attractive targets for cyber-criminals.

Related posts

History of Binance: The Success and Failure of One of the Most Popular Cryptocurrency Exchange

January 15, 2021
0

How to fuliza by Safaricom guide

January 15, 2021
0

ASUS debuts new ZenBook Duo | Pro Duo, VivoBook, ExpertBook and Chromebook laptops at CES 2021

January 15, 2021
0
signal-apps

Is Signal That Different From WhatsApp? Here Are 5 Ways It May Be Different

January 15, 2021
0

“Poorly configured or managed internet broadband routers could be the biggest cyber-risk targets locally. We know from experience that unsecured routers can easily fall prey to cyber-attacks”, says Teddy Njoroge, Country Manager for Internet Security company ESET East Africa.

READ  OPPO F7 Review: More than just great selfies

In November as many as 900,000 Deutsche Telekom customers in Germany were taken offline over a two-day period, as cyber-criminals attempted to deliver a huge Distributed Denial of Service (DDos) attack by hijacking the ISP’s internet broadband routers into a botnet.

A DDos occurs when cyber-criminals access and commandeer devices, networks and systems into a group of connected and coordinated computers (botnet) for malicious purposes such as to drive immense traffic (request for service) towards a targeted site to the extent of causing a temporary or permanent collapse (denial) of service.

In this instance the attack could fool the vulnerable routers into downloading and executing malicious code. The aim was to crash or exploit them through commands to change settings, steal Wi-Fi credentials, or bombard target websites with unwanted traffic.

The Deutsche Telekom attack was only thwarted when users were advised to switch off their devices and download newly-released firmware updates to patch the exploits. The router being the frontline gate pass to your network, it is important to take extra precautions during set up and configuration.

The key best practice in safeguarding against attacks is carrying out regular updates for your router and IoT devices. These provide patches from manufacturers that take care of any potential vulnerabilities.

Ensuring your router is well configured and not relying on the default manufacturer settings such as usernames and passwords could help curb this menace.

“Failure to change these is a huge risk since default login details can be hacked online, allowing cyber-criminals to take over your connected devices. Always Change and provide Strong passwords with a mix of Upper case, lower case, numbers and special characters for all your devices as necessary”, says Njoroge.

READ  NATCOM Pays Outstanding $177m to Clear its NITEL, MTel Acquisition

Related to this is the need to implement a strong password for your Wi-Fi Connection. If supported by encryption the better your security against potential attacks. Passwords should only be accessible to the authorized people using the connection.

These should be reset regularly and which also applies to the Access Point (AP) credentials. It is good practice to change the name of your AP to make it difficult for hackers to easily identify who it belongs to, or what router is providing the service.

Another weak spot is the Remote Management function. Ensure this feature is only turned on when you are certain that you are accessing a safe internet connection. Disable the Universal Plug and Play (UPnP) feature and which is a weak point that can allow access to hackers as it potentially may bypass authentication.

Lastly, always do some research on routers before you make purchases so that you can determine the ones that have adequate consideration on security.

Readers 1,121

Share

  • Click to share on Telegram (Opens in new window)
  • More
  • Click to share on Tumblr (Opens in new window)
  • Click to print (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Pinterest (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Pocket (Opens in new window)

Like this:

Like Loading...

Related

Milcah Lukhanyu

Milcah Lukhanyu

Milcah Lukhanyu covers daily news briefs at TechMoran. She is the person who will probably read your press release and get the story out of it or totally trash it. Send tips to [email protected]

Related Posts

cryptocurrencies

History of Binance: The Success and Failure of One of the Most Popular Cryptocurrency Exchange

January 15, 2021
0
How To

How to fuliza by Safaricom guide

January 15, 2021
0
Tech

ASUS debuts new ZenBook Duo | Pro Duo, VivoBook, ExpertBook and Chromebook laptops at CES 2021

January 15, 2021
0
signal-apps
Tech

Is Signal That Different From WhatsApp? Here Are 5 Ways It May Be Different

January 15, 2021
0
Tech

Between WhatsApp, Facebook And Signal Which Platform Collects More Personal Data?

January 15, 2021
0
Tech

HTML5 Tech Takes Over from Flash to Advance E-Sports Industry

January 15, 2021
0
uganda-8
Tech

This Is Why The Ugandan Web Is Currently In Turmoil And Their Internet Has Been Shutdown

January 14, 2021
0
Leadership

SEACOM suffers second major executive exit as CTO resigns

January 14, 2021
0

https://bit.ly/2VOxuoBhttps://bit.ly/2VOxuoBhttps://bit.ly/2VOxuoB
ADVERTISEMENT

Join our Mailing List

Loading

Recent Posts

Baidu establishes an Intelligent electric vehicle arm to bring autonomous cars on a road near you

January 15, 2021

Adam Molai’s JUA Kickstarter Fund Doubles to $2M to Kickstart African Entrepreneurship

January 15, 2021

History of Binance: The Success and Failure of One of the Most Popular Cryptocurrency Exchange

January 15, 2021

How we can all contribute to the Green revolution 

January 15, 2021

How to fuliza by Safaricom guide

January 15, 2021
">
">

Follow Us

">

There are many sites out there focused on blowing off some steam, from funny entertainment to thrilling experiences like playing online, in some cases online gaming could grant you the chance to win extra money. We came across rocketpot.io while browsing for a good btc casino online and it left us a very good impression with their wide variety of games and crypto offering.

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

© 2019 Moran Media Group - All rights reserved TechMoran.

No Result
View All Result
  • Startups
  • Reviews
  • Insider
    • Obituaries
  • Business
  • Women
  • Blockchain
  • Columnists
  • Hacks & Facts
    • How To
  • Editions
    • US Edition
    • India Edition
    • MENA Edition
    • Asia Edition
    • Europe Edition
    • International Edition

© 2019 Moran Media Group - All rights reserved TechMoran.

Login to your account below

Forgotten Password? Sign Up

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
%d bloggers like this: