What's New in Home Network Security
Everything that changed in router settings, DNS, and IoT segmentation.
Everything that changed in router settings, DNS, and IoT segmentation.
Hardware and software launches that changed home network security in 2026.
ASUS's new RT-BE96U and RT-BE19000 routers ship with one-click IoT isolation — automatically creating a separate VLAN for smart home devices. This is the first consumer router to offer enterprise-grade segmentation without manual VLAN configuration. Setup takes under two minutes through the ASUS Router app.
Source: ASUS Press ReleaseNetgear's router security suite now blocks malicious domains at the DNS level before they resolve, adding a layer that catches threats Bitdefender's traditional scanning misses. The update applies to all Orbi and Nighthawk Pro models from 2023 onward. Early testing shows a 34% improvement in phishing domain detection compared to Armor 2.0.
Source: Netgear BlogThe BE85 Pro mesh system uses on-device machine learning to detect unusual traffic patterns — like a smart camera suddenly uploading gigabytes of data at 3 AM. Alerts push to your phone with a one-tap device quarantine option. This marks the first sub-$500 mesh system with behavioral analysis built in.
Source: TP-Link AnnouncementUbiquiti's new entry-level gateway includes VLAN management, IDS/IPS, and DNS filtering in a form factor the size of a paperback. Previously, this feature set required $300+ Dream Machine hardware. Early adopters report the IDS catches IoT botnet callbacks that consumer routers miss entirely.
Source: Ubiquiti StoreYou can now assign different DNS providers to individual devices on your Eero network — kids' tablets get NextDNS with parental filtering, your work laptop gets Cloudflare for speed, and IoT devices get Quad9 for malware blocking. Previously, DNS settings applied network-wide only. This granular control is a first for consumer mesh systems.
Source: Eero BlogFirewalla's latest update lets you run WPA3-Enterprise authentication through its built-in RADIUS server — the same protocol used in corporate environments. Each family member gets unique credentials instead of sharing a single Wi-Fi password. If a device is compromised, you revoke one credential without changing the network password for everyone.
Source: Firewalla Release NotesPolicy shifts and security advisories affecting your home network setup.
The FCC's voluntary cybersecurity labeling program — similar to Energy Star but for security — expanded to cover consumer routers in January 2026. Look for the shield logo on boxes: it means the router supports automatic security updates, WPA3, and secure default configurations. Already adopted by ASUS, Netgear, and TP-Link on new models.
Source: FCC.govThe Cybersecurity and Infrastructure Security Agency published a directive requiring federal contractors to patch known SOHO router vulnerabilities within 21 days of disclosure. While this applies to contractors, CISA's vulnerability list is public — and it highlights routers in millions of homes. The directive named 14 specific CVEs across TP-Link, Netgear, and D-Link models.
Source: CISA.govCalifornia's new IoT security law requires manufacturers to provide security updates for connected devices for at least five years after sale. This includes routers, mesh systems, and smart home hubs. Manufacturers must publish an end-of-support date at point of sale. Non-compliance carries fines up to $10,000 per device.
Source: California LegislatureCarnegie Mellon's CERT Coordination Center flagged three budget router brands shipping hardware with vulnerabilities disclosed over 18 months ago. The affected models use outdated firmware with known remote code execution flaws. CERT recommends checking your router's firmware version against the National Vulnerability Database immediately.
Source: CERT/CC AdvisoryTP-Link pushed emergency patches for the Archer AX73, AX55, and AX21 after researchers demonstrated remote takeover through the web management interface. The vulnerability allowed unauthenticated access to router settings from the local network. If you own any of these models and haven't updated since September, do it now.
Source: TP-Link Security BulletinA new transatlantic agreement means routers certified under the EU's Cyber Resilience Act automatically qualify for FCC Cyber Trust Mark status — and vice versa. This harmonization will speed up secure router availability and reduce the number of region-specific firmware variants with different security patch levels.
Source: European CommissionJoin 4,200+ readers. Maya sends one annual digest — every update that matters, organized and ready to scan. No spam, no weekly emails.
Join 4,200+ secured readers · Unsubscribe anytime
Studies and data that reshaped our understanding of home network threats.
Researchers at Princeton's CITP tested 14 popular consumer routers and found that 60% send DNS queries in plaintext by default, even when the router claims to support DNS-over-HTTPS. The issue: DoH is available but disabled out of the box, and buried three menus deep. Most users never find the setting.
Source: Princeton CITPF-Secure's annual threat report shows a 40% increase in IoT botnet recruitment attempts targeting home networks. The most targeted device classes: IP cameras, smart plugs, and NAS devices. Average time from device connection to first exploitation attempt: 5 minutes and 30 seconds — down from 12 minutes in 2025.
Source: F-Secure Threat Report 2026NIST Special Publication 800-183 received its first update in seven years, adding guidance on IoT network segmentation, DNS-level filtering, and WPA3-Enterprise deployment in residential settings. The update acknowledges that home networks now routinely carry 25+ connected devices — up from an average of 8 when the original guidelines were written.
Source: NIST SP 800-183 Rev. 2Bitdefender researchers found a firmware-level backdoor in three popular Wi-Fi extender brands sold on Amazon. The backdoor allows remote access to the extended network through a hardcoded credential. Combined sales of affected models exceeded 2 million units. Bitdefender recommends replacing affected extenders rather than patching.
Source: Bitdefender LabsA scan of 18,000 home networks found that over a quarter are running firmware at least two versions behind current — meaning known vulnerabilities are unpatched. The primary reason: users never configured automatic updates, and manual update notifications were either disabled or ignored. Routers older than 4 years were three times more likely to be outdated.
Source: University of Michigan CSECloudflare's network data shows that 41% of US home internet traffic now uses encrypted DNS — up from 28% in 2025. The jump is driven by default DoH enablement in Chrome, Firefox, and iOS 19. However, 59% of queries still travel in plaintext, leaving browsing habits visible to ISPs and local network snoopers.
Source: Cloudflare RadarThe directional changes reshaping how we secure home networks.
Shipments of mesh Wi-Fi systems surpassed standalone routers for the first time in Q2 2026. This matters for security: mesh systems increasingly include built-in threat detection, automatic segmentation, and centralized device management. The standalone router — with its single access point and limited processing power — is becoming a legacy architecture.
The average US home now has 25.3 connected devices, up from 22 in 2025. This includes an average of 4 cameras, 3 smart speakers, and 6 smart plugs or switches per home. Each device is a potential network entry point, making VLAN-based IoT segmentation no longer optional — it's baseline security hygiene.
Services like NextDNS, Quad9, and Control D saw subscriber growth of 65% in 2026. The appeal: block malware, phishing, and tracking domains before they ever reach your devices — no software to install on each device. Security researchers now recommend DNS filtering as the first layer of home network defense, ahead of antivirus.
After years of requiring manual updates, ASUS, Netgear, and TP-Link now ship routers with automatic firmware updates enabled out of the box. This single change is projected to reduce the number of routers running vulnerable firmware by 40% within 18 months. Users can still opt out, but the default is now secure.
Over half of routers set up in 2026 use WPA3 as the default encryption standard — up from 39% in 2025. WPA3's Simultaneous Authentication of Equals protocol eliminates the offline dictionary attacks that plagued WPA2. However, backward compatibility mode (WPA2/WPA3 mixed) remains a weak point that attackers exploit.
The biggest shift isn't technical — it's usability. Router management interfaces across major brands underwent significant redesigns in 2026, prioritizing plain-language security status over technical jargon. TP-Link's "Network Health Score" and Netgear's "Security Dashboard" now give non-technical users a clear picture of their network's risk level without requiring networking knowledge.