Here are the most vulnerable connected devices in your home

Here are the most vulnerable connected devices in your home

Your connected security cameras give you peace of mind. They act both as a deterrent to criminals and can provide evidence for the police in case you are a burglary victim.

We have bad news. Scourges can easily jam your cameras with a $15 gadget, blinding them. Tap or click here for how the trick works and what you can do to prevent it.

Now here’s some worse news. Blocking what your cameras see is one thing, but hackers can also use them to get into your network. And it’s not just cameras. We show you how to secure your most vulnerable devices.

Here’s the back story

Cybersecurity researchers at Forescout identified connected devices at the highest risk of being hacked. The results included IoT (Internet of Things) devices commonly found in our homes. Any device connected to a network to send and receive data falls under IoT.

Criminals hacking these devices can cause many problems:

  • They can implant malware or ransomware.
  • They can get sensitive information from the data the devices transmit.
  • They can use the devices as a gateway to access your network.
  • Once they’re on your network, they can access your other devices, such as your computer.

RELATED: 3 ways to find out if your smart TV was hacked (and how to protect it)

See also  Can iPhone be hacked? What you should know about iOS security

Here are the five most vulnerable IoT devices:

  • IP camera: This includes any surveillance camera connected to a network.
  • VoIP: Voice over internet protocol (VoIP) is a type of telephone system that uses an internet connection to make and receive calls.
  • Video conference: This became very popular during the outbreak of the pandemic, and many people and businesses still use video conferencing every day.
  • ATMs: Researchers found that many ATMs are on the same network as other IoT devices, such as security cameras. Hackers can use these devices to gain access to ATMs.
  • Printers: As you focus on securing your computer, router, phone and other connected devices, don’t forget that the printer is another vulnerability. Tap or click here for five steps to keep hackers away from your printer.

How to stay safe

There are a few simple steps you can take to protect your connected devices and reduce the risk of being hacked:

Continue reading

Do this or anyone can see what your security camera sees

Security Alert: Devices most commonly used to spy on spouses and partners [List]

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *