These are the most vulnerable connected devices in your home

These are the most vulnerable connected devices in your home

These are the most vulnerable connected devices in your home

Your connected security cameras give you peace of mind. They also serve as a deterrent to criminals and can provide evidence to the police in the event that you are the victim of a burglary.

We have some bad news. Thieves can easily jam your cameras with a $15 gadget, rendering them blind. Tap or click here to learn how the trick works and what you can do to prevent it.

Here’s even worse news. Blocking what your cameras see is one thing, but hackers can also use them to get into your network. And it’s not just cameras. We’ll show you how to secure your most vulnerable devices.

Here’s the background

Cybersecurity researchers at Forescout identified connected devices with the highest risk of hacking. The results included IoT (Internet of Things) devices commonly found in our homes. Any device connected to a network to send and receive data belongs to the IoT.

Criminals hacking these devices can cause many problems:

  • They can embed malware or ransomware.
  • They can obtain sensitive information from the data the devices transmit.
  • They can use the devices as a gateway to access your network.
  • Once on your network, they can access your other devices, such as your computer.

RELATED: 3 ways to tell if your smart TV has been hacked (and how to protect it)

Here are the five most vulnerable IoT devices:

  • IP camera: This includes any surveillance camera connected to the network.
  • VoIP: Voice over Internet Protocol (VoIP) is a type of telephone system that uses an Internet connection to make and receive calls.
  • video conferencing: This became extremely popular during the start of the pandemic and many people and businesses continue to use video conferencing every day.
  • ATMs: The researchers found that many ATMs are on the same network as other IoT devices, such as security cameras. Hackers can use these devices to access ATMs.
  • Printers: When you focus on securing your PC, router, phone and other connected devices, don’t forget that your printer is another vulnerability. Tap or click here for five steps to prevent hackers from getting into your printer.

How to stay safe

There are a few simple steps you can take to protect your connected devices and reduce the risk of hacking:

Continue reading

Do this or anyone can see what your security camera sees

Security alert: Devices most commonly used to spy on spouses and partners [List]

#vulnerable #connected #devices #home

مقالات ذات صلة

اترك تعليقاً

لن يتم نشر عنوان بريدك الإلكتروني. الحقول الإلزامية مشار إليها بـ *

زر الذهاب إلى الأعلى
سيتات آورج 2022 سيتات آورج 2022