security

US Security Agency Urges Tech Makers To Stop Manufacturing Products With Default Passwords – Digital Information World


There is an alarming increase in the figures for tech products that are serving as a major security threat to users, thanks to their default passwords.

The development was highlighted by a leading American security agency which says the rise in such products needs to stop as the practice is not only illegal but serves as a huge security hazard. Furthermore, it gives rise to hackers who can carry on with their exploitation on this front.

The CISA issued a new warning in this regard and how it’s high time that each tech maker takes the necessary steps to bring an end to such endeavors.

The agency went on to add how the threat grew even more massive when hackers arising from Iran attained access to several American water suppliers by exploiting this default action over a known name for logic controllers that could be programmed.

As a reply to this act, the CISA says that the alert issued ended up urging all tech makers to get rid of default passwords in terms of release, layout, and updates for the goods.

In such an attack, we saw how the default password was quite popular and even marketed on several public forums. This is where so many threat actors were present and were known to hunt for intelligence in terms of breaching the whole American System.

It’s not a major secret about how both hardware and software goods are sold through static and default means. And while it might be convenient in terms of giving clients such passwords, it’s definitely getting so much simpler for hackers to target such types of individuals across the board. This would entail a business as well as a leading governmental agency that continues to make use of such goods.

Readers Also Like:  True Anomaly raises $100M to scale space security tech - TechCrunch

More on this front was revealed in October when the American National Security Agency recalled threats through reports that highlighted the leading cybersecurity errors that firms have been making for quite some time now.

At the top of the list included a long list of default configurations linked to apps and software design. So many tech makers were refusing to alter them and neglected such information despite knowing what a threat they would pose to users.

The alert generated on Friday by the CISA added how there was a plethora of evidence on this front which put forward another alarming point in terms of how users cannot be relied on to alter passwords to something that was more sufficient to ward off such attacks from taking place.

This is why it’s been quite an overdue affair in terms of forcing tech makers to rise up to the occasion and make the changes on their end to ensure a safe ecosystem for all to function in.

Another alternative for passwords set up as default was seen where the agency requested tech manufacturers to force clients to produce unique passwords after setup. Similarly, they would support the action of single sign-on too. This way, agencies can force tech producers to take on limited-duration setup passwords. The latter would be disabled on their own when a certain good gets installed and forces users to produce unique passwords over a long period.

In addition to that, manufacturers would carry out field tests to comprehend how clients put out products in the new environment and if the respective products are marketed in unsafe manners or not.

Readers Also Like:  LastPass security breach keeps getting worse, admits parent company - TechSpot

Such an alert just goes to show how the tech industry needs to wake up and adopt greater cybersecurity measures from the start of the product manufacturing process. They similarly should embrace the role linked to adding consumer safety as a priority, as per the initiative.

CISA warns of growing security risks from default passwords on tech products, urging immediate industry action.

Read next: Here’s What Happens on the Internet Every Minute





READ SOURCE

This website uses cookies. By continuing to use this site, you accept our use of cookies.