<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Internet of Things &#8211; Cyberwire Daily</title>
	<atom:link href="https://cyberwiredaily.com/category/internet-of-things/feed/" rel="self" type="application/rss+xml" />
	<link>https://cyberwiredaily.com</link>
	<description></description>
	<lastBuildDate>Sun, 14 Sep 2025 15:10:32 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://cyberwiredaily.com/wp-content/uploads/2025/09/icon-150x150.png</url>
	<title>Internet of Things &#8211; Cyberwire Daily</title>
	<link>https://cyberwiredaily.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The privacy risks of fitness trackers</title>
		<link>https://cyberwiredaily.com/the-privacy-risks-of-fitness-trackers/</link>
					<comments>https://cyberwiredaily.com/the-privacy-risks-of-fitness-trackers/#respond</comments>
		
		<dc:creator><![CDATA[Team-CWD]]></dc:creator>
		<pubDate>Sun, 14 Sep 2025 15:10:30 +0000</pubDate>
				<category><![CDATA[Internet of Things]]></category>
		<guid isPermaLink="false">https://cyberwiredaily.com/the-privacy-risks-of-fitness-trackers/</guid>

					<description><![CDATA[Internet of Things Privacy Should you beware of wearables? Here’s what you should know about the potential security and privacy risks of your smartwatch or fitness tracker. Smartwatches, fitness trackers, and other wearables are fast becoming almost as familiar to us as our mobile phones and tablets. These connected gadgets do much more than tell [...]]]></description>
										<content:encoded><![CDATA[<p> <br />
</p>
<div>
<div class="article-tags mb-2 dark big">
<p class="article-tag text-capitalize">Internet of Things</p>
<p class="article-tag text-capitalize">Privacy</p>
</div>
<p class="sub-title">Should you beware of wearables? Here’s what you should know about the potential security and privacy risks of your smartwatch or fitness tracker.</p>
<div class="hero-image-container">
        <picture><source srcset="https://web-assets.esetstatic.com/tn/-x266/wls/2022/01/fitness-trackers-smartwatches-privacy-security.png" media="(max-width: 768px)"/><source srcset="https://web-assets.esetstatic.com/tn/-x425/wls/2022/01/fitness-trackers-smartwatches-privacy-security.png" media="(max-width: 1120px)"/></picture>    </div>
</div>
<div>
<p>Smartwatches, fitness trackers, and other wearables are fast becoming almost as familiar to us as our mobile phones and tablets. These connected gadgets do much more than tell the time. They track our health, display our emails, control our smart homes and can even be used to pay in stores. They’re an extension of the so-called Internet of Things (IoT) that’s making all of our lives healthier and more convenient, while reducing smartphone screen time that <a href="https://www.statista.com/statistics/1224510/time-spent-per-day-on-smartphone-us/" target="_blank" rel="noopener">reached nearly six hours</a> for half of Americans this year.</p>
<p>Unsurprisingly, it’s a market <a href="https://www.grandviewresearch.com/industry-analysis/wearable-technology-market" target="_blank" rel="noopener">set to grow</a> by 12.5% annually over the next few years to exceed US$118 billion by 2028. But while wearables are reaching into more of our daily lives than ever, they’re also collecting more data and connecting to an increasing number of other smart systems. It pays to understand these potential security and privacy risks up front.</p>
<h2>What are the main security and privacy concerns?</h2>
<p>Threat actors have multiple ways to monetize attacks on smart wearables and the related ecosystem of apps and software. They could intercept and manipulate data and passwords and unlock lost or stolen devices. There are also potential privacy concerns over the covert sharing of personal data with third parties. Here’s a quick round-up:</p>
<h2>Stealing and manipulating data</h2>
<p>Some of the most feature-rich smartwatches provide synced access to your smartphone applications, such as email and messaging. That could provide opportunities for unauthorized users to intercept sensitive personal data. But of equal concern is where much of that data ends up being stored. If it’s not protected properly at rest the provider may be targeted by information thieves. There’s a thriving underground market for certain types of personal and financial data.</p>
<h3>Location-based threats</h3>
<p>Another key data type recorded by most wearables relates to location. With this information, hackers can build an accurate profile of your movements throughout the day. That could enable them to physically attack the wearer, or their car/household at times it is judged to be empty.</p>
<p>There are even greater concerns over the safety of children wearing such devices, if they are being tracked by unauthorized third parties.</p>
<h3>Third-party companies</h3>
<p>It’s not just security risks that users have to be alert to. The data your devices collect may be extremely valuable to advertisers. And there’s a roaring trade in such data in certain markets, although it should be tightly regulated in the EU thanks to legislation <a href="https://www.lexology.com/library/detail.aspx?g=fbbbf7ee-5e98-4b49-97d9-9ed29d8e3bc2" target="_blank" rel="noopener">introduced in 2018</a>. One report <a href="https://www.juniperresearch.com/press/healthcare-spend-in-wearables-reach-60-bn-2023" target="_blank" rel="noopener">claimed that revenue</a> made from data sold by health device manufacturers to insurance companies could reach US$855 million by 2023.</p>
<p>Some third parties may even use it to create advertising profiles on wearers and sell it onwards. If this data is stored by multiple other downstream companies, this presents a greater breach risk.</p>
<h3>Unlocking the smart home</h3>
<p>Certain wearables could be used to control smart home devices. They might even be set up to <a href="https://nuki.io/en/blog/smart-home/wearables-how-to-use-your-fitness-smartwatch-to-open-your-front-door-with-nuki/" target="_blank" rel="noopener">unlock your front door</a>. This presents a major security risk in the event devices are lost or stolen and anti-theft settings aren’t enabled.</p>
<p><a href="https://web-assets.esetstatic.com/wls/2022/01/fitness-trackers-smartwatches-privacy.jpg"><img fetchpriority="high" decoding="async" class="aligncenter wp-image-158736" src="https://web-assets.esetstatic.com/wls/2022/01/fitness-trackers-smartwatches-privacy.jpg" alt="" width="900" height="506"/></a></p>
<h2>Where do device ecosystems fall short?</h2>
<p>The device you wear is only one part of the picture. There are actually multiple elements—from the device firmware to the protocols it uses for connectivity to its app to its back-end cloud servers. All are susceptible to attack if security and privacy haven’t been properly considered by the manufacturer. Here are a few:</p>
<p><strong>Bluetooth:</strong> Bluetooth Low Energy is typically used to pair wearables to your smartphone. But <a href="https://www.csa.gov.sg/singcert/alerts/multiple-vulnerabilities-in-bluetooth-low-energy-devices" target="_blank" rel="noopener">numerous vulnerabilities</a> in the protocol have been discovered over the years. They could allow attackers in close proximity to crash devices, snoop on information, or manipulate data.</p>
<p><strong>Devices:</strong> Often the software on the device itself is vulnerable to external attack due to poor programming. Even the best designed watch ultimately has been built by humans, and therefore could contain coding errors. These can also lead to privacy leaks, data loss, and more.</p>
<p>Separately, weak authentication/encryption on devices may mean expose them to hijacking and eavesdropping. Users should also be aware of shoulder surfers if viewing sensitive messages/data on their wearables in public.</p>
<p><strong>Applications:</strong>  The smartphone apps linked to wearables are another avenue of attack. Again, they may be poorly written and riddled with vulnerabilities, exposing access to user data and devices. A separate risk is of the apps or even users themselves being careless with data. You may also accidentally download impostor apps designed to look like the legitimate ones, and entering personal information into them.</p>
<p><strong>Back-end servers:</strong> As mentioned, the providers’ cloud-based systems may store device information including location data and other details. This represents an attractive target for attackers looking for a big payday. There’s not much you can do about this apart from choosing a reputable provider with a good track record on security.</p>
<p>Unfortunately, many of the above scenarios are more than theoretical. A few years ago, security researchers found widespread vulnerabilities in kids’ smartwatches that exposed location and personal data. Previous to that, a separate investigation found many manufacturers were sending unencrypted personal data from children using the products to servers in China.</p>
<p>Concerns persist to this day, with research showing gadgets susceptible to manipulation which could even cause <a href="https://www.vpnmentor.com/blog/security-and-privacy-flaws-discovered-on-popular-wearable-devices/" target="_blank" rel="noopener">physical distress to the user</a>. Another <a href="https://www.zdnet.com/article/smartwatch-tracker-for-the-vulnerable-can-be-hacked-to-send-medication-reminders/" target="_blank" rel="noopener">study claimed that</a> hackers could change passwords, make calls, send text messages, and access cameras from devices designed to monitor the elderly and children.</p>
<h2>Top tips for locking down your devices</h2>
<p>Fortunately, there are several things you can do to minimize the risks outlined above. They include:</p>
<ul>
<li>Switching on two-factor authentication</li>
<li>Password-protecting lock screens</li>
<li>Changing settings to prevent any unauthorized pairing</li>
</ul>
<p>Protect your smartphone by:</p>
<ul>
<li>Only visiting legitimate app stores</li>
<li>Keeping all software up-to-date</li>
<li>Never jailbreaking/rooting devices</li>
<li>Limiting app permissions</li>
<li>Installing reputable security software on the device</li>
</ul>
<p>Protect the smart home by:</p>
<ul>
<li>Not syncing wearables to your front door</li>
<li>Keeping devices on the guest Wi-Fi network</li>
<li>Updating all devices to the latest firmware</li>
<li>Ensuring all device passwords are changed from factory default settings</li>
</ul>
<p>Overall:</p>
<ul>
<li>Choosing reputable wearables providers</li>
<li>Taking a close look at privacy and security settings to ensure they’re configured correctly</li>
</ul>
<p>As wearables become a bigger part of all our lives, they’ll become a bigger target for attackers. Do your research before buying, and close off as many avenues for attack as possible once you boot up the device.</p>
<p><span class="update-block"></p>
<p><em> BEFORE YOU GO: Sports data for ransom – it’s not all just fun and games anymore </em></p>
<p></span>
</div>
<p><br />
<br /><a href="https://www.welivesecurity.com/2022/01/26/every-breath-you-take-every-move-you-make-fitness-trackers-privacy-risks/" style="font-size: 11px;color:#D5DBDB">Source</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cyberwiredaily.com/the-privacy-risks-of-fitness-trackers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How parents can protect their family from IoT threats</title>
		<link>https://cyberwiredaily.com/how-parents-can-protect-their-family-from-iot-threats/</link>
					<comments>https://cyberwiredaily.com/how-parents-can-protect-their-family-from-iot-threats/#respond</comments>
		
		<dc:creator><![CDATA[Team-CWD]]></dc:creator>
		<pubDate>Sat, 13 Sep 2025 13:57:19 +0000</pubDate>
				<category><![CDATA[Internet of Things]]></category>
		<guid isPermaLink="false">https://cyberwiredaily.com/how-parents-can-protect-their-family-from-iot-threats/</guid>

					<description><![CDATA[Kids Online Internet of Things It pays to do some research before taking a leap into the world of internet-connected toys The Internet of Things (IoT) is changing the way we live and work. From smart pacemakers to fitness trackers, voice assistants to smart doorbells, the technology is making us healthier, safer, more productive and [...]]]></description>
										<content:encoded><![CDATA[<p> <br />
</p>
<div>
<div class="article-tags mb-2 dark big">
<p class="article-tag text-capitalize">Kids Online</p>
<p class="article-tag text-capitalize">Internet of Things</p>
</div>
<p class="sub-title">It pays to do some research before taking a leap into the world of internet-connected toys</p>
<div class="hero-image-container">
        <picture><source srcset="https://web-assets.esetstatic.com/tn/-x266/wls/2022/09/toys-smart-iot-parents.jpg" media="(max-width: 768px)"/><source srcset="https://web-assets.esetstatic.com/tn/-x425/wls/2022/09/toys-smart-iot-parents.jpg" media="(max-width: 1120px)"/></picture>    </div>
</div>
<div>
<p>The Internet of Things (IoT) is changing the way we live and work. From smart pacemakers to fitness trackers, voice assistants to smart doorbells, the technology is making us healthier, safer, more productive and entertained.</p>
<p>At the same time, it has also provided opportunities for manufacturers to market flashy new toys for our children. The <a href="https://www.globenewswire.com/news-release/2022/04/04/2415359/0/en/Global-Smart-Toys-Market-Size-Share-Industry-Trends-Analysis-Report-By-Product-By-Distribution-Channel-By-Regional-Outlook-and-Forecast-2021-2027.html" target="_blank" rel="noopener">global market for smart toys</a> is set to see percentage growth in the double digits, to exceed US$24 billion by 2027. But when connectivity, data and computing meet, privacy and <a href="https://www.eset.com/uk/about/newsroom/blog/has-your-childs-smart-toy-been-hacked/" target="_blank" rel="noopener">security concerns</a> are never far away.</p>
<p>Chances are that you, too, are considering buying one of these toys for your children and so encourage their learning and creativity. However, to protect your data and privacy (and your child’s safety!), it pays to do some research before taking a leap into the world of connected toys.</p>
<h2>What are smart toys and what are the cyber-risks?</h2>
<p>Smart toys have been around for several years. Like any IoT device, the idea is to use connectivity and on-device intelligence to deliver more immersive, interactive and responsive experiences. This could include features like:</p>
<ul>
<li>Microphones and cameras that receive video and audio from the child</li>
<li>Speakers and screens to relay audio and video back to the child</li>
<li>Bluetooth to link the toy up to a connected app</li>
<li>Internet connectivity to the home Wi-Fi router</li>
</ul>
<p>With this kind of technology, smart toys can go beyond the inanimate playthings most of us grew up with. They have the power to engage children through back-and-forth interaction and even acquire new functionality or behaviors by downloading additional capabilities from the internet.</p>
<p><span class="update-block"></p>
<p>RELATED READING: These things may be cool, but are they safe? </p>
<p></span></p>
<p>Unfortunately, manufacturers can skimp on safeguards in the race to market. As a result, their products could contain software vulnerabilities and/or allow insecure passwords. They might record data and send it covertly to third-party, or they could require parents input other sensitive details but then store them insecurely.</p>
<h3>When toys go bad</h3>
<p>There have been several examples in the past of this happening. Some of the most notorious are:</p>
<ul>
<li>The Fisher Price Smart Toy Bear was designed for children aged 3-8 as “an interactive learning friend that talks, listens, and ‘remembers’ what your child says and even responds when spoken to.” However, a <a href="https://www.vice.com/en/article/wnx5vw/internet-connected-fisher-price-teddy-bear-left-kids-identities-exposed">flaw in the connected smartphone app</a> could have enabled hackers to gain unauthorized access to user data.</li>
<li>CloudPets allowed parents and their kids to share audio messages via a cuddly toy. However, the back-end database used to store passwords, email addresses and the messages themselves was stored insecurely in the cloud. <a href="https://www.troyhunt.com/data-from-connected-cloudpets-teddy-bears-leaked-and-ransomed-exposing-kids-voice-messages/" target="_blank" rel="noopener">It was left publicly exposed online</a> without any password to protect it.</li>
<li>My Friend Cayla is a child’s doll fitted with smart technology, enabling children to ask it questions and receive answers back, via an internet lookup. However, researchers discovered a security flaw which could allow hackers to spy on children and their parents via the doll. It led the German <a href="https://www.bbc.co.uk/news/world-europe-39002142" target="_blank" rel="noopener">telecoms watchdog to urge parents</a> to bin the device over privacy concerns. Much the same happened with a smartwatch called Safe-KID-One in 2019.</li>
</ul>
<p>In Christmas 2019, security consultancy NCC Group ran a study of seven smart toys and found 20 noteworthy problems – including two that were deemed “high risk” and three that were medium risk. It found <a href="https://www.mynewsdesk.com/nccgroup/blog_posts/a-technical-review-of-connected-toy-security-88677">these common issues</a>:</p>
<ul>
<li>No encryption on account creation and log-in process, exposing usernames and passwords.</li>
<li>Weak password policies, meaning users could choose easy-to-guess login credentials.</li>
<li>Vague privacy policies, often non-compliant with the US Children’s Online Privacy Protection Rule <a href="https://www.ftc.gov/legal-library/browse/rules/childrens-online-privacy-protection-rule-coppa" target="_blank" rel="noopener">(COPPA)</a>. Others broke the UK’s Privacy and Electronic Communications Regulations <a href="https://ico.org.uk/for-organisations/guide-to-pecr/what-are-pecr/" target="_blank" rel="noopener">(PECR)</a> by passively collecting web cookies and other tracking info .</li>
<li>Device pairing (i.e., with another toy or app) was often done vie Bluetooth with no authentication required. This could enable anyone within range to connect with the toy to:</li>
<li>Stream offensive or upsetting content</li>
<li>Send manipulative messages to the child</li>
<li>In some cases (i.e., kids’ walkie talkies) a stranger would only need to buy another device from a store to be able to communicate with children in the area with the same toy.</li>
<li>Attackers could theoretically hijack a smart toy with audio capabilities to hack smart homes, by sending audio commands to a voice-activated system (i.e., “Alexa, open the front door”).</li>
</ul>
<h2>How to mitigate the privacy and security risks of smart toys</h2>
<p>With smart toys representing a certain degree of security and privacy risks, consider the following best practice advice to counter the threats:</p>
<ul>
<li><strong>Do your research before buying:</strong> Check if there’s been negative publicity or research done on the model’s security and privacy credentials.</li>
<li><strong>Secure your router</strong>. This device is central to your home network and talks to all of your home’s internet-connected devices.</li>
<li><strong>Power down devices:</strong> When not in use, power the device down to minimize risks.</li>
<li><strong>Familiarize yourself with the toy:</strong> At the same time, ensure that any smaller children are under supervision.</li>
<li><strong>Check for updates:</strong> If the toy can receive them, ensure it’s running the latest firmware version.</li>
<li><strong>Choose secure connectivity:</strong> Ensure that devices use authentication when pairing via Bluetooth and use encrypted communications with the home router.</li>
<li><strong>Understand where any data is stored:</strong> And what reputation the company has for security.</li>
<li><strong>Use </strong><strong>strong and unique passwords</strong> when creating accounts.</li>
<li><strong>Minimize how much data you share:</strong> This will reduce your risk exposure if the data is stolen and/or the company is breached.</li>
</ul>
<p>Smart toys can indeed be educational and entertaining. By ensuring first that your data and kids are safe, you’ll be able to sit back and enjoy the fun.</p>
<p><span class="update-block"></p>
<p>Further reading:<br />
<br />IoT security: Are we finally turning the corner?<br />
<br />Privacy by Design: Can you create a safe smart home?<br />
<br />To learn more about more dangers faced by children online, as well as about how technology can help, head over to <a href="https://saferkidsonline.eset.com/" target="_blank" rel="noopener">Safer Kids Online</a>.</p>
<p></span>
</div>
<p><br />
<br /><a href="https://www.welivesecurity.com/2022/09/08/toys-behaving-badly-how-parents-protect-family-iot-threats/" style="font-size: 11px;color:#D5DBDB">Source</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cyberwiredaily.com/how-parents-can-protect-their-family-from-iot-threats/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>8 questions to ask yourself before getting a home security camera</title>
		<link>https://cyberwiredaily.com/8-questions-to-ask-yourself-before-getting-a-home-security-camera/</link>
					<comments>https://cyberwiredaily.com/8-questions-to-ask-yourself-before-getting-a-home-security-camera/#respond</comments>
		
		<dc:creator><![CDATA[Team-CWD]]></dc:creator>
		<pubDate>Fri, 12 Sep 2025 13:22:44 +0000</pubDate>
				<category><![CDATA[Internet of Things]]></category>
		<guid isPermaLink="false">https://cyberwiredaily.com/8-questions-to-ask-yourself-before-getting-a-home-security-camera/</guid>

					<description><![CDATA[As each new smart home device may pose a privacy and security risk, do you know what to look out for before inviting a security camera into your home? UPDATE (November 2nd 2022): This article was updated to add a statement from Ring. Security cameras were once the preserve of the rich and famous. Now anyone [...]]]></description>
										<content:encoded><![CDATA[<p> <br />
</p>
<div>
<p class="sub-title">As each new smart home device may pose a privacy and security risk, do you know what to look out for before inviting a security camera into your home?</p>
<div class="hero-image-container">
        <picture><source srcset="https://web-assets.esetstatic.com/tn/-x266/wls/2022/10/security-camera-smart-home-privacy.jpg" media="(max-width: 768px)"/><source srcset="https://web-assets.esetstatic.com/tn/-x425/wls/2022/10/security-camera-smart-home-privacy.jpg" media="(max-width: 1120px)"/></picture>    </div>
</div>
<div>
<p>UPDATE (November 2<sup>nd</sup> 2022): This article was updated to add a statement from Ring.</p>
<p>Security cameras were once the preserve of the rich and famous. Now anyone can get their hands on one thanks to technological advances. The advent of the Internet of Things (IoT) has created a  major new market – for manufacturers of devices like connected doorbells and baby monitors, and more sophisticated whole-of-property systems. Connected to home Wi-Fi networks, these devices allow owners to watch live video footage, record video for later and receive alerts when out of the house.</p>
<p>Yet these same features can also expose households to new risks if the camera is compromised and/or the footage is leaked. Not all vendors have as big a focus on security and privacy as they should. That means you need to ask the right questions before starting. Here are some examples:</p>
<h2>1. Do I actually need a security camera?</h2>
<p>First up, it’s time to decide if a home security camera is really necessary or if you’re only interested in getting one because everyone else seems to. Part of this decision-making process may be working out what type of set-up to get: whether you need a full CCTV system requiring professional installation, or a cheaper connected camera that can be up-and-running quickly and is controlled via a smartphone app.</p>
<h2>2. Am I aware of the security and privacy risks?</h2>
<p>This is critical. While home security cameras are meant to protect the household, getting one might, in fact, unwittingly put the household at greater risk. In a worst-case scenario, remote or local hackers could access live feeds to spy on family members or case out the property to see if it’s empty. Both scenarios can be unnerving, especially as you would have little warning that this was happening.</p>
<p>One way hackers could gain access to these feeds involves accessing the home wireless network, perhaps by guessing or brute-forcing the Wi-Fi password. A more likely scenario, however, is an attack in which they guess or crack your account passwords or exploit an unpatched <a href="https://techcrunch.com/2022/08/18/amazon-ring-security-risk/?guccounter=1" target="_blank" rel="noopener">firmware vulnerability</a>.</p>
<p>READ ALSO: D‑Link camera vulnerability allows attackers to tap into the video stream</p>
<h2>3. Have I checked the security pedigree of the vendor?</h2>
<p>With so many models on the market, it pays to research what’s on offer, and the reputation of different vendors. If you’re serious about security, you’ll want a reputable brand with a strong track record on building reliable products with good consumer ratings for security and privacy.</p>
<p>Things like prompt patching, strong encryption, enhanced log-in security and watertight privacy policies are important. And if engineers are required to fit a system, how much access are they granted? One US home security technician <a href="https://www.cnet.com/home/smart-home/adt-home-security-technician-pleads-guilty-to-spying-on-customer-camera-feeds-for-years/">was able to spy</a> on hundreds of homes over a four-and-a-half year period after adding his email on set-up.</p>
<h2>4. Do I know what happens to footage and data?</h2>
<p>Another potential element of risk is related to the vendor itself. Do you know if the video data is stored on-site or in the provider’s cloud datacenter? In its latest transparency report, Amazon-owned Ring <a href="https://techcrunch.com/2022/07/13/amazon-ring-video-footage-government/" target="_blank" rel="noopener">claimed to have turned over</a> an unprecedented volume of its customers’ footage to the US authorities last year, including in some cases without the consent of the device’s owner. Many camera owners may feel uncomfortable about such policies.</p>
<blockquote>
<p>Statement by Ring from November 2<sup>nd </sup>2022 <br />Police access to Ring videos + Emergency Law Enforcement Requests</p>
<ol>
<li>
<p><em>Ring does not give police access to users’ cameras, devices, device locations or live streams.</em></p>
</li>
<li>
<p><em>If a customer wants to share video with law enforcement, they must have a Ring Protect Plan in place and download and share the recordings directly. Customers are in total control of the information they choose to share.</em></p>
</li>
<li>
<p><em>Like any other company, Ring may receive law enforcement requests, such as warrants, and we carefully review these requests. Ring’s <a href="https://support.ring.com/hc/en-us/articles/360001318523-Law-Enforcement-Legal-Process-Guidelines" target="_blank" rel="noopener">Law Enforcement Guidelines</a> describe our process for receiving and processing information requests from law enforcement.</em></p>
</li>
<li>
<p><em>Emergency requests are rare, and each request is closely scrutinized by trained specialists on the legal team. We hold a high bar for ourselves in these situations, and we only make these rare exceptions when time is of the essence and law enforcement can demonstrate an immediate threat.</em></p>
</li>
</ol>
</blockquote>
<h2>5. Do I know how to secure the camera?</h2>
<p>Once you’re aware of the major security and privacy risks involved, it’s worth familiarizing yourself with what’s needed to ensure these devices run safely. Default passwords should always be changed to something strong and unique. For added safety, use two-factor authentication whenever it’s available.</p>
<p>Also, devices should be regularly updated to the latest firmware. Choose a reputable vendor with a track record of manufacturing properly secured devices and shipping firmware updates. Switching off remote viewing of video footage will offer an added peace of mind and minimize the chances of a hacker accessing it.</p>
<p><a href="https://web-assets.esetstatic.com/wls/2022/10/security-camera-mobile-phone.jpg"><img decoding="async" class="aligncenter wp-image-165948" src="https://web-assets.esetstatic.com/wls/2022/10/security-camera-mobile-phone.jpg" alt="" width="950" height="534"/></a></p>
<h2>6. Do I know how to configure the right smart home settings?</h2>
<p>It’s not all about the settings on the camera itself. Your home router is the gateway to the smart home and could be a source of security risk if not properly configured. UPnP and port forwarding functions, which allow devices to find others on the same network, could be hijacked by hackers to access smart cameras. That’s why they should be switched off on the router, although it might prevent some applications and devices from working.</p>
<p>READ ALSO: Privacy by Design: Can you create a safe smart home?</p>
<h2>7. Do I know how to check if the camera has been hacked?</h2>
<p>As mentioned, it can be difficult to spot if a security camera has been hijacked. Two of the things to look out for would be abnormal movements of the camera or strange voices or sounds coming from it. If suddenly you can’t log in because the password to your account has changed, then that clearly isn’t a good sign either.</p>
<p>Another possible avenue to consider is increased data usage or poor performance. If the device is being accessed by an unauthorized user, your camera may run slower because of limited memory and CPU power. This isn’t a fool-proof check though – it may also be the result of something more mundane like a poor internet connection.</p>
<h2>8. Am I aware of the impact on others?</h2>
<p>Getting a home security camera is not just about your own security and privacy. It could also impact the rights of your neighbors, if a camera captures images of people outside the boundary of your property. Under the GDPR, these individuals also have privacy rights that must be respected. It’s a good idea to position cameras so as to minimize any intrusion, and to be as transparent as possible with neighbors. The UK government has a <a href="https://www.gov.uk/government/publications/domestic-cctv-using-cctv-systems-on-your-property/domestic-cctv-using-cctv-systems-on-your-property">good guide here.</a></p>
<p>There’s plenty to consider before buying a home security system. And like any purchase, the more up-front research you can do on it, the better.</p>
<p>BEFORE YOU GO: These things may be cool, but are they safe?</p>
</div>
<p><br />
<br /><a href="https://www.welivesecurity.com/2022/10/03/8-questions-ask-yourself-getting-home-security-camera/" style="font-size: 11px;color:#D5DBDB">Source</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cyberwiredaily.com/8-questions-to-ask-yourself-before-getting-a-home-security-camera/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Here’s how to stay safe</title>
		<link>https://cyberwiredaily.com/heres-how-to-stay-safe/</link>
					<comments>https://cyberwiredaily.com/heres-how-to-stay-safe/#respond</comments>
		
		<dc:creator><![CDATA[Team-CWD]]></dc:creator>
		<pubDate>Thu, 11 Sep 2025 13:13:54 +0000</pubDate>
				<category><![CDATA[Internet of Things]]></category>
		<guid isPermaLink="false">https://cyberwiredaily.com/heres-how-to-stay-safe/</guid>

					<description><![CDATA[Make sure that the device that’s supposed to help you keep tabs on your little one isn’t itself a privacy and security risk We’ve probably all read horror stories online: a parent is woken in the middle of the night by strange noises coming from their child’s bedroom. They open the door, only to find [...]]]></description>
										<content:encoded><![CDATA[<p> <br />
</p>
<div>
<p class="sub-title">Make sure that the device that’s supposed to help you keep tabs on your little one isn’t itself a privacy and security risk</p>
<div class="hero-image-container">
        <picture><source srcset="https://web-assets.esetstatic.com/tn/-x266/wls/2022/11/baby-monitors-cybersecurity-privacy.jpg" media="(max-width: 768px)"/><source srcset="https://web-assets.esetstatic.com/tn/-x425/wls/2022/11/baby-monitors-cybersecurity-privacy.jpg" media="(max-width: 1120px)"/></picture>    </div>
</div>
<div>
<p>We’ve probably all read <a href="https://www.washingtonpost.com/technology/2018/12/20/nest-cam-baby-monitor-hacked-kidnap-threat-came-device-parents-say/" target="_blank" rel="noopener">horror stories online</a>: a parent is woken in the middle of the night by strange <a href="https://metro.co.uk/2022/02/17/parents-hear-random-man-shushing-son-through-video-baby-monitor-16122118/" target="_blank" rel="noopener">noises coming from their child’s bedroom</a>. They open the door, only to find a stranger “talking” to their baby through the monitor. While rare, such cases do happen from time to time.</p>
<p>Smart technology has provided us with numerous ways to keeping our houses safe(r), from smart locks and doorbells to home security cameras. But when gadgets are fitted with computing power and internet connectivity, they also become a target for remote hackers.</p>
<p>Fortunately, a few best practices can help to provide peace of mind that your baby monitor will be doing its job, and not the bidding of a stranger, and doesn’t itself become a security and privacy risk.</p>
<h2>How can hackers hijack baby monitors?</h2>
<p>Why would anyone want to hijack a baby monitor? Some are just looking to play a prank. Others may have more voyeuristic aims in mind. And some may even be looking to steal personal information overheard on the monitor, or confirming the house is empty so it can be burgled.</p>
<p>Whatever the reason, there are two main ways to hack a baby monitor. They depend on the kind of monitor it is:</p>
<p><strong>Radio frequency monitors</strong> require an eavesdropper to be within range of the signal and know the frequency it is using. Both this, and the fact that most leading products of this type use encrypted communications, make these models a safer bet overall, albeit with more limited functionality.</p>
<p><strong>Wi-Fi monitors </strong>are more exposed to hacking because they connect to the home router and, often, out to the public internet. The latter support functionality which allows parents to view the video feed via a mobile app, wherever they are. While this could provide peace-of-mind when out and about, it also opens the door to remote hackers, who might be scouring the web looking for unsecured cameras to hijack.</p>
<p>Even devices that don’t offer this functionality could theoretically be hacked if an attacker were able to hijack the home router. The simplest way of doing so is to guess or “brute-force” its password, although more sophisticated attacks may seek to exploit firmware vulnerabilities.</p>
<p><a href="https://web-assets.esetstatic.com/wls/2022/11/hacking-baby-monitors-risks.jpg"><img decoding="async" class="aligncenter wp-image-166852 size-full" src="https://web-assets.esetstatic.com/wls/2022/11/hacking-baby-monitors-risks.jpg" alt="hacking-baby-monitors-risks" width="1000" height="563"/></a></p>
<h3>What could happen?</h3>
<p>Either way, the potential repercussions are enough to alarm any parent. Hackers could use their access to eavesdrop silently on your baby, or even communicate with it if the device has a speaker. In some cases, footage from hacked cameras has even ended up on underground sites for others to watch.</p>
<p>Real-life examples of baby monitor hacking in the past include:</p>
<ul>
<li>An infamous 2014 case in which it emerged that a website in Russia was broadcasting live footage from homes and businesses all over the world, taken from smart devices secured only with default passwords.</li>
<li>A 2018 case, in which a <a href="https://www.npr.org/sections/thetwo-way/2018/06/05/617196788/s-c-mom-says-baby-monitor-was-hacked-experts-say-many-devices-are-vulnerable" target="_blank" rel="noopener">South Carolina mother</a> noticed her baby monitor camera was being remotely moved to focus on the spot where she breast-fed her son.</li>
<li>Another <a href="https://nordvpn.com/blog/baby-monitor-iot-hacking/" target="_blank" rel="noopener">incident from 2018</a> in which a hacker broadcast messages through a hacked monitor, threatening to kidnap the family’s child.</li>
<li><a href="https://www.nbcnews.com/news/us-news/stranger-hacks-baby-monitor-tells-child-i-love-you-n1090046" target="_blank" rel="noopener">A 2019 incident</a> in which a stranger hacked a Seattle couple’s monitor and began broadcasting creepy messages to the child.</li>
<li><a href="https://kslnewsradio.com/1967666/utah-social-media-influencer-warns-of-wifi-baby-monitor-hack/" target="_blank" rel="noopener">A similar case</a> from earlier this year, when a stranger hijacked a monitor and terrorized a three-year-old with menacing messages using a voice changer.</li>
</ul>
<h2>How to keep your family safe</h2>
<p>A British consumer rights group <a href="https://www.which.co.uk/reviews/baby-monitors/article/could-my-baby-monitor-get-hacked-a1JXu7s9CSYD" target="_blank" rel="noopener">recently urged parents</a> to take their security concerns over baby monitors direct to the manufacturers. It claimed that many of these firms will only change their ways once enough consumers demand changes.</p>
<p>“The more people ask, the more security will become their priority,” it claimed. There are also various efforts at a legislative level, for example in the <a href="https://www.congress.gov/bill/116th-congress/house-bill/1668" target="_blank" rel="noopener">United States</a> and in the <a href="https://digital-strategy.ec.europa.eu/en/library/cyber-resilience-act" target="_blank" rel="noopener">European Union</a>, that are designed to improve the baseline levels of security offered by IoT and smart products.</p>
<p><span class="update-block"></p>
<p>RELATED READING: Privacy by Design: Can you create a safe smart home?</p>
<p></span></p>
<p>However, in the meantime, parents need advice they can trust. The good news is that a few best practice security tips go a long way towards keeping the hackers at bay. Here are a few examples:</p>
<ul>
<li>Research your options well, and aim to go with a well-regarded manufacturer that places a strong emphasis on security, and has good reviews.</li>
<li>Install any updates to the device&#8217;s software (or firmware)</li>
<li>If possible, choose a model that does not allow remote communication via an app. If it does, turn off remote access, especially when not in use.</li>
<li>Setting up a strong and unique password, and enabling two-factor authentication if possible.</li>
<li>Review monitor logs regularly to check for any suspicious activity, such as individuals accessing it from an unusual IP or at strange times.</li>
<li>Secure your wireless router with a strong, unique password. Also, disable remote access to it, as well as port forwarding or UPnP. Make sure the router is kept updated with any firmware patches.</li>
</ul>
<p>Baby monitor hacking is an alarming prospect for any parent. But as with any IoT device, it pays to understand where the risks are, and to take extra precautions to lock out any malicious third parties.</p>
<p><span class="update-block"></p>
<p>To learn more about more dangers faced by children online as well as about how technology can help, head over to <a href="https://saferkidsonline.eset.com/" target="_blank" rel="noopener">Safer Kids Online</a>.<br />
<br />Why not also watch ‘<a href="https://www.youtube.com/playlist?list=PLP8zm262B3MVc-_mgl27DRiGarge_M7dQ" target="_blank" rel="noopener">Hey PUG</a>‘, ESET’s new animated series teaching kids to recognize online threats?</p>
<p></span>
</div>
<p><br />
<br /><a href="https://www.welivesecurity.com/2022/11/07/hacking-baby-monitors-childs-play-how-stay-safe/" style="font-size: 11px;color:#D5DBDB">Source</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cyberwiredaily.com/heres-how-to-stay-safe/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Near-ultrasonic attacks on voice assistants</title>
		<link>https://cyberwiredaily.com/near-ultrasonic-attacks-on-voice-assistants/</link>
					<comments>https://cyberwiredaily.com/near-ultrasonic-attacks-on-voice-assistants/#respond</comments>
		
		<dc:creator><![CDATA[Team-CWD]]></dc:creator>
		<pubDate>Thu, 11 Sep 2025 13:13:42 +0000</pubDate>
				<category><![CDATA[Internet of Things]]></category>
		<guid isPermaLink="false">https://cyberwiredaily.com/near-ultrasonic-attacks-on-voice-assistants/</guid>

					<description><![CDATA[How your voice assistant could do the bidding of a hacker – without you ever hearing a thing Regular WeLiveSecurity readers won’t be stunned to read that cyberattacks and their methods keep evolving as bad actors continue to enhance their repertoire. It’s also become a common refrain that as security vulnerabilities are found and patched (alas, [...]]]></description>
										<content:encoded><![CDATA[<p> <br />
</p>
<div>
<p class="sub-title">How your voice assistant could do the bidding of a hacker – without you ever hearing a thing</p>
<div class="hero-image-container">
        <picture><source srcset="https://web-assets.esetstatic.com/tn/-x266/wls/2023/06/nuit-ultrasound-attacks.jpg" media="(max-width: 768px)"/><source srcset="https://web-assets.esetstatic.com/tn/-x425/wls/2023/06/nuit-ultrasound-attacks.jpg" media="(max-width: 1120px)"/></picture>    </div>
</div>
<div>
<p>Regular WeLiveSecurity readers won’t be stunned to read that cyberattacks and their methods keep evolving as bad actors continue to enhance their repertoire. It’s also become a common refrain that as security vulnerabilities are found and patched (alas, sometimes after being exploited), malicious actors find new chinks in the software armor.</p>
<p>Sometimes, however, it is not “just” a(nother) security loophole that makes the headlines, but a new form of attack. This was also the case recently with a rather unconventional attack method dubbed NUIT. The good news? NUIT was unearthed by academics and there are no reports of anybody exploiting it for pranks or outright cybercrime. That said, it doesn’t hurt to be aware of another way your privacy and security could be at risk – as well as about the fact that NUIT can actually come in two forms.</p>
<h2>How NUIT saw the light of day</h2>
<p>NUIT, or <a href="https://sites.google.com/view/nuitattack/home" target="_blank" rel="noopener">Near-Ultrasound Inaudible Trojan</a>, is a class of attack that could be deployed to launch silent and remote takeovers of devices that use or are powered by voice assistants such as Siri, Google Assistant, Cortana, and Amazon Alexa. As a result, any device accepting voice commands – think your phone, tablet or smart speaker – could be open season. Ultimately, the attack could have some dire consequences, ranging from a breach of privacy and loss of trust to even the compromise of a company’s infrastructure, which could, in turn, result in hefty monetary losses.</p>
<p><a href="https://www.usenix.org/system/files/sec23fall-prepub-261-xia-qi.pdf" target="_blank" rel="noopener">Described by a team of researchers</a> at the University of Texas in San Antonio (UTSA) and the University of Colorado Colorado Springs (UCCS), NUIT is possible because microphones in digital assistants can respond to near-ultrasound waves played from a speaker. While inaudible to you, this sound command would prompt the always-on voice assistant to perform an action – let’s say, turn off an alarm, or open the front door secured by a smart lock.</p>
<p>To be sure, NUIT isn’t the first acoustic attack to have made waves over the years. Previously, attacks with similarly intriguing names have been described – think SurfingAttack, <a href="https://arxiv.org/abs/1708.09537" target="_blank" rel="noopener">DolphinAttack</a>, <a href="https://synrg.csl.illinois.edu/papers/lipread_nsdi18.pdf" target="_blank" rel="noopener">LipRead</a> and SlickLogin, including some other inaudible attacks that that, too, targeted smart-home assistants.</p>
<h2>Night, night</h2>
<p>As mentioned, NUIT comes in two forms: They are:</p>
<ul>
<li><strong>NUIT 1</strong> – This is when the device is both a source and the target of an attack. In such cases, all it takes is a user playing an audio file on their phone that causes the device to perform an action, like sending a text message with its location.</li>
</ul>
<p style="text-align: center;"><iframe title="NUIT 1 End to End no response Attack" width="814" height="458" src="https://www.youtube.com/embed/TUnPFR35AR4?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe><span data-mce-type="bookmark" style="display: inline-block; width: 0px; overflow: hidden; line-height: 0;" class="mce_SELRES_start">﻿</span></iframe></p>
<ul>
<li><strong>NUIT 2</strong> – This attack is launched by a device with a speaker to another device with a microphone, like from your PC to a smart speaker.</li>
</ul>
<p style="text-align: center;"><iframe title="NUIT 2 SILENT RESPONSE END TO END ATTACK blurFace" width="814" height="458" src="https://www.youtube.com/embed/mFmS4vvL8ko?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe><span data-mce-type="bookmark" style="display: inline-block; width: 0px; overflow: hidden; line-height: 0;" class="mce_SELRES_start">﻿</span><span data-mce-type="bookmark" style="display: inline-block; width: 0px; overflow: hidden; line-height: 0;" class="mce_SELRES_start">﻿</span></iframe></p>
<p>As an example, let’s say you are watching a webinar on Teams or Zoom. A user could unmute themselves and play a sound, which would then be picked up by your phone, prompting it to visit a dangerous website and compromising the device with malware.</p>
<p>Alternatively, you could be playing YouTube videos on your phone with your loudspeakers, and the phone would then perform an unwarranted action. From the user’s perspective, this attack does not require any specific interaction, which makes it all the worse.</p>
<h2>Should NUIT keep you up at night?</h2>
<p>What does it take to perform such an attack? Not much, as for NUIT to work, the speaker from which it is launched needs to be set to above a certain level of volume, with the command lasting less than a second (0.77s).</p>
<p>Moreover, obviously you need to have your voice assistant enabled. According to the researchers, out of the 17 devices tested, only <a href="https://www.utsa.edu/today/2023/03/story/chen-nuit-research.html" target="_blank" rel="noopener">Apple Siri-enabled devices were harder to crack</a>. This was because a hacker would need to steal your unique voice fingerprint first to get the phone to accept commands.</p>
<p>Which is why everyone should set up their assistants to only work with their own voice. Alternatively, consider switching your voice assistant off when it’s not needed; indeed, keep your cyber-wits about you when using any IoT devices, as all sorts of smart gizmos can be easy prey for cybercriminals.</p>
<h2>The doctor’s orders</h2>
<p>The researchers, who will also present their NUIT research at the <a href="https://www.usenix.org/conference/usenixsecurity23" target="_blank" rel="noopener">32<sup>nd</sup> USENIX Security Symposium</a>, also recommend that users scan their devices for random microphone activations. Both Android and iOS devices display microphone activation, usually with a green dot on Android, and with a brown dot on iOS in the upper part of the screen. In this case, also consider reviewing your app permissions for microphone access, as not every app needs to hear your surroundings.</p>
<p>Likewise, listen to audio using earphones or headsets, as that way, you are less likely to share sound with your surroundings, protecting against an attack of this nature.</p>
<p>This is also a good time to make sure you have the cybersecurity basics covered –  keep all your devices and software updated, enable two-factor authentication on all of your online accounts, and use reputable security software across all your devices.</p>
<p><span class="update-block"></p>
<p>RELATED READING:<br />
<br />Work from home: Should your digital assistant be on or off?<br />
<br />Alexa, who else is listening?</p>
<p></span>
</div>
<p><br />
<br /><a href="https://www.welivesecurity.com/2023/06/07/hear-no-evil-ultrasound-attacks-voice-assistants/" style="font-size: 11px;color:#D5DBDB">Source</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cyberwiredaily.com/near-ultrasonic-attacks-on-voice-assistants/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How robotic vacuums can spy on you</title>
		<link>https://cyberwiredaily.com/how-robotic-vacuums-can-spy-on-you/</link>
					<comments>https://cyberwiredaily.com/how-robotic-vacuums-can-spy-on-you/#respond</comments>
		
		<dc:creator><![CDATA[Team-CWD]]></dc:creator>
		<pubDate>Thu, 11 Sep 2025 04:48:22 +0000</pubDate>
				<category><![CDATA[Internet of Things]]></category>
		<guid isPermaLink="false">https://cyberwiredaily.com/how-robotic-vacuums-can-spy-on-you/</guid>

					<description><![CDATA[Internet of Things Digital Security Privacy Mitigate the risk of data leaks with a careful review of the product and the proper settings. Since the first model hit the market in the 2000s, robotic vacuum cleaners have advanced rapidly. They can swiftly clean every corner without much bumping around, and the latest versions are close [...]]]></description>
										<content:encoded><![CDATA[<p> <br />
</p>
<div>
<div class="article-tags mb-2 dark big">
<p class="article-tag text-capitalize">Internet of Things</p>
<p class="article-tag text-capitalize">Digital Security</p>
<p class="article-tag text-capitalize">Privacy</p>
</div>
<p class="sub-title">Mitigate the risk of data leaks with a careful review of the product and the proper settings.</p>
<div class="hero-image-container">
        <picture><source srcset="https://web-assets.esetstatic.com/tn/-x266/wls/2023/07/hero-image-vacuum.jpeg" media="(max-width: 768px)"/><source srcset="https://web-assets.esetstatic.com/tn/-x425/wls/2023/07/hero-image-vacuum.jpeg" media="(max-width: 1120px)"/></picture>    </div>
</div>
<div>
<p>Since the first model hit the market in the 2000s, robotic vacuum cleaners have advanced rapidly. They can swiftly clean every corner without much bumping around, and the latest versions are close to defeating their long-time nemeses: cables and shoelaces. </p>
<p>They comes with a price, though, and we are not talking only about money. To deal with obstacles, modern robot vacuums are equipped with sensors, GPS or even cameras! Using powerful tools to collect your dust, your smart vacuum also gathers something else – your personal data.  </p>
<p>Cases like the <a href="https://www.technologyreview.com/2022/12/19/1065306/roomba-irobot-robot-vacuums-artificial-intelligence-training-data-privacy/">leaked pictures of a woman sitting on toilet</a> raise questions about how much your robot vacuum knows about you and – more importantly – what it is sending to someone else.  </p>
<h3>Just how much does your vacuum cleaner know about you? </h3>
<p>A few well-known cases might give us some hints.  </p>
<p>In early 2022, the <a href="https://www.technologyreview.com/2022/12/19/1065306/roomba-irobot-robot-vacuums-artificial-intelligence-training-data-privacy/">MIT Technology Review acquired personal photos</a> of in homes and intimate photos captured from low angles. According to the publication, these pictures were taken by a development version of iRobot’s Roomba J7 series. </p>
<p>iRobot – one of the world’s most prominent vendors of robotic vacuums – confirmed that these images were captured by its Roombas in 2020 as part of a product development process. </p>
<p>The pictures were taken by the Roomba and then sent to Scale AI, which uses them for AI development and which, ultimately, helps iRobot to improve its products by recognizing more objects and obstacles. Unfortunately, in this case, a number of Scale AI gig workers did not respect their privacy agreements and shared the photos taken by the vacuum cleaners on private groups on social media. </p>
<h3>Show me your house, I’ll tell you what you need </h3>
<p>In August 2022, <a href="https://techcrunch.com/2022/08/05/amazon-is-buying-irobot-for-1-7b/">Amazon announced its intention to acquire iRobot</a>. In a time of bigger regulatory concern over market competition and privacy, the deal sparked about what data could be collected by Amazon and how it could be used. In July 2023, <a href="https://www.reuters.com/markets/deals/amazons-irobot-deal-eu-antitrust-crosshairs-2023-07-06/">the European Commission announced an official investigation into the deal</a> to understand whether the deal it could give a company like Amazon a big advantage to its Marketplace business; i.e., if the images collected could be used to improve organic purchase suggestions and better tailored ads based on real personal data.     </p>
<p>For example, robotic vacuum cleaners can learn your daily routine based on the cleaning schedule you set. Likewise, saved house floor maps reveal a home’s size and design, which can suggest income levels and other information about one’s living conditions. And, of course, a data leak could potentially reveal images of your place, including ways of identifying who you are and where you live. </p>
<h3>Cold War-like espionage by your vacuum cleaner? </h3>
<p>Inspired by the eavesdropping technique, which has been in use since the Cold War, <a href="https://www.bing.com/ck/a?!&amp;&amp;p=a7fdb166f1bae8eaJmltdHM9MTY4MDczOTIwMCZpZ3VpZD0zZWIzMWJmMS0yNTZjLTZmNTEtM2M0MC0wOTFhMjQyZTZlZDUmaW5zaWQ9NTIxNw&amp;ptn=3&amp;hsh=3&amp;fclid=3eb31bf1-256c-6f51-3c40-091a242e6ed5&amp;psq=Spying+with+Your+Robot+Vacuum+Cleaner%3a+Eavesdropping+via+Lidar+Sensors&amp;u=a1aHR0cHM6Ly93d3cuY3MudW1kLmVkdS9-bmlydXBhbS9pbWFnZXMvMl9wdWJsaWNhdGlvbi9wYXBlcnMvTGlkYXJQaG9uZV9TZW5TeXMyMF9uaXJ1cGFtLnBkZj9mcm9tPWFydGljbGVfbGluaw&amp;ntb=1">the 2020 research conducted by computer scientists</a> from the National University of Singapore (NUS) and the University of Maryland (UMD), used the navigation systems of robot vacuums and converted them into laser microphones. </p>
<p>This way, with an object such as a vacuum cleaner inside your house, it is possible to record changes in vibrations produced in response to the pressure waves created. These changes can, ultimately, be converted so that a conversation taking place in that room can be listened to. </p>
<h3>The more capable a smart device is, the more it knows about you </h3>
<p>Recent versions of robotic vacuum cleaners usually keep a map of your house and can be operated via a smartphone app. Many of these models also feature voice control, usually compatible with Amazon Alexa or Google Assistant. And most of the smart capabilities come from cameras, sensors and microphones. </p>
<p>If you want a privacy-focused robot vacuum cleaner, consider those that rely on inertial measurement combining gyroscopes and accelerometers. The reason is simple: Such devices do not need cameras, lasers or mapping to work. However, the drawback is that they move less effectively than their high-end counterparts and may repeatedly run through some areas of your home.  </p>
<p>When it comes to phone control over a vacuum cleaner, use secure mobile apps instead of voice control.  </p>
<h3>How to protect your data – points to consider before purchasing a new smart vacuum </h3>
<ul>
<li>Some models can operate offline without some features like remote control or scheduling. Others need to be specifically set not to send data to the manufacturer’s server.  </li>
<li>Many cleaners also can be prohibited from entering certain rooms, such as a bedroom or a bathroom. This can be done through settings or by using virtual wall barriers.   </li>
<li>Before buying your new little robot, also check out its manufacturer. Choose those that favor data encryption and require two-factor authentication to access the robot’s mobile apps. </li>
<li>Choose a vendor that offers regular updates to the mobile app and the vacuum’s firmware. </li>
<li>Always check the lifespan of the product you’re buying and for how long it is expected to receive manufacturer support. </li>
</ul>
<h3>Trading privacy for convenience </h3>
<p>The evolution of smart vacuum cleaners is an example of people trading privacy for convenience. The more capable our smart devices are, and the more data they are allowed to gather, the more they intrude upon our lives; hence there is a lower guarantee of anyone keeping their privacy fully intact. </p>
<p>However, for those who value their privacy and data protection over convenience, the best way to stay out of sight is to stick with good old “dumb” devices. Using a standard vacuum cleaner may require more time to finish a weekend clean-up, but at least it won’t take pictures of you sitting on the toilet. </p>
<p>Nonetheless, if you still find robotic vacuum cleaners too convenient to avoid, then being selective with their settings and the data points they can gather is one way to retain some semblance of control over your privacy.  </p>
</div>
<p><br />
<br /><a href="https://www.welivesecurity.com/en/privacy/gathering-dust-and-data-how-robotic-vacuums-can-spy-on-you/" style="font-size: 11px;color:#D5DBDB">Source</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cyberwiredaily.com/how-robotic-vacuums-can-spy-on-you/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Robot vacuums may be doing more than they claim</title>
		<link>https://cyberwiredaily.com/robot-vacuums-may-be-doing-more-than-they-claim/</link>
					<comments>https://cyberwiredaily.com/robot-vacuums-may-be-doing-more-than-they-claim/#respond</comments>
		
		<dc:creator><![CDATA[Team-CWD]]></dc:creator>
		<pubDate>Thu, 11 Sep 2025 04:47:05 +0000</pubDate>
				<category><![CDATA[Internet of Things]]></category>
		<guid isPermaLink="false">https://cyberwiredaily.com/robot-vacuums-may-be-doing-more-than-they-claim/</guid>

					<description><![CDATA[Internet of Things Privacy When it comes to privacy, it remains complicated and near impossible for a consumer to make an informed decision. 16 Aug 2023  •  , 3 min. read A presentation at DEF CON, 10 am on a Sunday morning in Las Vegas. My expectation was it would be poorly attended – I [...]]]></description>
										<content:encoded><![CDATA[<p> <br />
</p>
<div>
<div class="article-tags mb-2 dark big">
<p class="article-tag text-capitalize">Internet of Things</p>
<p class="article-tag text-capitalize">Privacy</p>
</div>
<p class="sub-title">When it comes to privacy, it remains complicated and near impossible for a consumer to make an informed decision.</p>
<p class="article-info mb-5">
        <span>16 Aug 2023</span><br />
        <span class="d-none d-lg-inline"> • </span><br />
        <span class="d-inline d-lg-none">, </span><br />
        <span>3 min. read</span>
    </p>
<div class="hero-image-container">
        <picture><source srcset="https://web-assets.esetstatic.com/tn/-x266/wls/2023/2023-8/1080x1080-copy.jpeg" media="(max-width: 768px)"/><source srcset="https://web-assets.esetstatic.com/tn/-x425/wls/2023/2023-8/1080x1080-copy.jpeg" media="(max-width: 1120px)"/></picture>    </div>
</div>
<div>
<p>A presentation at DEF CON, 10 am on a Sunday morning in Las Vegas. My expectation was it would be poorly attended – I could not have been more wrong. A packed room greeted Dennis Giese, a renowned expert in “hacking” robot vacuum cleaners. The theme of the presentation was how to stop your robot vacuum cleaner from sending data back to the vendor, a discussion based on privacy and security.</p>
<p>Last month my colleague Roman Cuprik published an article on WeLiveSecurity detailing how these home vacuuming devices may be spying on their owners, so I will not get into the weeds of the potential issues of spying here but rather discuss the standout parts of Dennis’s excellently delivered presentation.</p>
<p>The researcher Dennis led had a simple goal – could they root the target device without disassembling it? Rooting the device in simplistic terms means gaining access to the underlying software used to control the device, and possibly modifying it. In the current case, this creates an opportunity not to make the device go rogue but rather for the software to be modified in order not to share personal data and to give ultimate control back to the owner.</p>
<h2>A play on words </h2>
<p>I am assuming at this point you are either savvy enough to have read Roman’s article or that you have a grasp on the privacy issues, such as robot vacuums with cameras sending pictures back to the vendor’s cloud servers, potentially identifying all the things you have in your home.</p>
<p>One of the issues highlighted by Dennis is that vendor claims may not match reality: for example one company called out in the presentation claims it does not send any data back to the cloud, it never duplicates data, and that the cameras on its devices are only there to protect objects in your home from collisions. This sounds feasible, but another feature listed for the same device is that you can access the camera remotely and watch the device working. So how do they do that if the image or video stream is not shared through the company’s cloud servers that provide the functionality; maybe there is some genuine wizardry involved.</p>
<p>Another issue raised in the presentation was the wording used by companies to describe the functionality and features of the products. Due to bad press in recent years relating to devices with cameras on them, and especially the possibility of abuse, some manufacturers have reputedly removed cameras; their documentation instead says their devices utilize “optical sensors”. This is just a play on words; they are — of course — cameras and it was demonstrated in the presentation that they are capable of capturing images: <em>they are cameras</em>.</p>
<p>The presentation went into more details and examples that were all just as shocking; it also highlighted that many of the devices tested and found to have privacy and security issues are certified by some renowned testing labs; the examples of certifying authorities given were a respected German testing authority and, more broadly, the European Union certification of devices.</p>
<h2>Statements versus reality </h2>
<p>In Roman’s blogpost, he recommends conducting pre-purchase investigation of devices, which I fully concur with in most instances had I not listened to this presentation at DEF CON. It’s clear that while security has improved in the firmware and operation of these dust-collecting devices, it remains complicated and near impossible for a consumer to make an informed decision.</p>
<p>A device that states it shares no data to the cloud, has no onboard cameras, and carries certification for security and privacy from widely respected testing labs would seem to meet all the requirements of a privacy-conscious consumer; in reality, though, what is happening under the hood may be completely different. The presentation was not about one manufacturer or model but listed numerous cases of both. Until there is clarity, I’ll stick to pushing my handheld vacuum around the house.</p>
<p>One last comment – a callout to Dennis Giese for delivering such a great presentation on a Sunday morning in Vegas. But I urge you not to divulge issues to a public audience and rather follow industry-coordinated disclosure standards. I am sure the robot vacuum cleaner companies would appreciate this, as would most consumers. No one wants to own a device with a vulnerability that has no patch due to disclosure not following industry best practices.</p>
</div>
<p><br />
<br /><a href="https://www.welivesecurity.com/en/privacy/def-con-31-robot-vacuums-may-be-doing-more-than-they-claim/" style="font-size: 11px;color:#D5DBDB">Source</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cyberwiredaily.com/robot-vacuums-may-be-doing-more-than-they-claim/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The risks of unsupported IoT tech</title>
		<link>https://cyberwiredaily.com/the-risks-of-unsupported-iot-tech/</link>
					<comments>https://cyberwiredaily.com/the-risks-of-unsupported-iot-tech/#respond</comments>
		
		<dc:creator><![CDATA[Team-CWD]]></dc:creator>
		<pubDate>Thu, 11 Sep 2025 04:40:32 +0000</pubDate>
				<category><![CDATA[Internet of Things]]></category>
		<guid isPermaLink="false">https://cyberwiredaily.com/the-risks-of-unsupported-iot-tech/</guid>

					<description><![CDATA[In the digital graveyard, a new threat stirs: Out-of-support devices becoming thralls of malicious actors Outdated devices are often easy targets for attackers, especially if they have vulnerabilities that can be exploited and no patches are available due to their end-of-life status. Hacks of outdated or vulnerable devices are an issue, but why would anyone [...]]]></description>
										<content:encoded><![CDATA[
<div>
<p class="sub-title">In the digital graveyard, a new threat stirs: Out-of-support devices becoming thralls of malicious actors</p>
<div class="article-authors d-flex flex-wrap">
<div class="article-author d-flex"><picture><source srcset="https://web-assets.esetstatic.com/tn/-x45/wls/2023/03/mark-szabo.jpg" media="(max-width: 768px)" /></picture></div>
</div>
<div class="hero-image-container"><picture><source srcset="https://web-assets.esetstatic.com/tn/-x266/wls/2024/8-2024/unsupported-iot-wls.jpeg" media="(max-width: 768px)" /><source srcset="https://web-assets.esetstatic.com/tn/-x425/wls/2024/8-2024/unsupported-iot-wls.jpeg" media="(max-width: 1120px)" /><img decoding="async" class="hero-image" src="https://web-assets.esetstatic.com/tn/-x700/wls/2024/8-2024/unsupported-iot-wls.jpeg" alt="Old devices, new dangers: The risks of unsupported IoT tech" /></picture></div>
</div>
<div>
<p>Outdated devices are often easy targets for attackers, especially if they have vulnerabilities that can be exploited and no patches are available due to their end-of-life status.</p>
<p>Hacks of outdated or vulnerable devices are an issue, but why would anyone attempt to hack discontinued devices or those running out-of-support software? To gain control? To spy on people? The answer is quite multifaceted.</p>
<h2>The end of life is coming — for your device</h2>
<p>There comes a time when a device becomes obsolete, be it because it gets too slow, the owner buys a new one, or it lacks functionalities compared to its modern replacement, with the manufacturer shifting focus to a new model and designating the old one as end of life (EOL).</p>
<p>At this stage, manufacturers stop the marketing, selling, or provisioning of parts, services, or software updates for the product. This can mean many things, but from our standpoint, it means that device security is no longer being properly maintained, making the end user vulnerable.</p>
<p>After support has ended, cybercriminals can start gaining the upper hand. Devices such as cameras, teleconferencing systems, routers, and smart locks have operating systems or firmware that, once obsolete, no longer receive security updates, leaving the door open to hacking or other misuse.</p>
<blockquote><p>Related reading: 5 reasons to keep your software and devices up to date</p></blockquote>
<p>Estimates say that there are <a href="https://www.cnbc.com/2023/01/09/the-dark-webs-criminal-minds-see-iot-as-the-next-big-hacking-prize.html" target="_blank" rel="noopener">around 17 billion IoT devices in the world</a> – from door cameras to smart TVs – and this number keeps increasing. Suppose that just a third of them become obsolete in five years. That would mean that a bit over 5.6 billion devices could become vulnerable to exploitation – not right away, but as support dries up, the likelihood would increase.</p>
<p>Very often, these vulnerable devices can end up as parts of a <strong>botnet</strong> – a network of devices turned into zombies under a hacker’s command to do their bidding.</p>
<h2>One person’s trash is another’s treasure</h2>
<p>A good example of a botnet exploiting outdated and vulnerable IoT devices was <a href="https://www.zdnet.com/article/this-is-why-the-mozi-botnet-will-linger-on/" target="_blank" rel="noopener">Mozi</a>. This botnet was infamous for having hijacked hundreds of thousands of internet-connected devices each year. Once compromised, these devices were used for various malicious activities, including data theft and delivering malware payloads. The botnet was very persistent and capable of rapid expansion, but it was taken down by 2023.</p>
<p>Exploitation of vulnerabilities in a device like an IoT video camera could enable an attacker to use it as a surveillance tool and snoop on you and your family. Remote attackers could take over vulnerable, internet-connected cameras, once their <a href="https://www.zdnet.com/article/vulnerabilities-in-these-iot-cameras-could-give-attackers-full-control-warn-researchers/" target="_blank" rel="noopener">IP addresses</a> are discovered, without having had previous access to the camera or knowing its login credentials. The list of vulnerable EOL IoT devices goes on, with manufacturers typically <a href="https://www.securityweek.com/over-70-vulnerabilities-will-remain-unpatched-cisco-eol-routers/" target="_blank" rel="noopener">not taking action</a> to patch such vulnerable devices; indeed this is not possible when a manufacturer has gone out of business.</p>
<p>Why would someone use an out-of-date device that even the manufacturer deems unsupported? Be it either lack of awareness or unwillingness to purchase an up-to-date product, the reasons can be many and understandable. However, that does not mean that these devices should be kept in use — especially when they stop receiving security updates.</p>
<p>Alternatively, why not give them a new purpose?</p>
<h2>Old device, new purpose</h2>
<p>A new trend has emerged due to the abundance of IoT devices in our midst: the reuse of old devices for new purposes. For example, turning your old iPad into a smart home controller, or using an old phone as a digital photo frame or as a car’s GPS. The <a href="https://www.computerworld.com/article/2487680/20-great-uses-for-an-old-android-device.html?page=2" target="_blank" rel="noopener">possibilities are numerous</a>, but security should still be kept in mind – these electronics should not be connected to the internet due to their vulnerable nature.</p>
<p>On the other hand, getting rid of an old device by throwing it away is also not a good idea from a security standpoint. Apart from the environmental angle of not messing up landfills with toxic materials, old devices can include treasure troves of confidential information collected over their lifetime of use.</p>
<figure class="image"><img loading="lazy" decoding="async" src="https://web-assets.esetstatic.com/wls/2024/8-2024/iot-home.jpeg" alt="A living room with internet capable devices highlighted" width="1899" height="1068" /><figcaption>Modern homes are replete with appliances capable of internet connection.<br />
(Source: <a href="https://www.shutterstock.com/image-photo/top-view-man-sitting-on-couch-2390825471" target="_blank" rel="noopener">Shutterstock</a>)</figcaption></figure>
<p>Again, unsupported devices can also end up as zombies in a botnet — a network of compromised devices controlled by an attacker and used for nefarious purposes. These zombie devices most often end up being used for distributed denial of service (DDoS) attacks, which overload someone’s network or website as revenge, or for a different purpose such as drawing attention away from another attack.</p>
<p>Botnets can cause a lot of damage, and many times it takes a coalition (often consisting of multiple police forces cooperating with cybersecurity authorities and vendors) to take down or disrupt a botnet, like in the case of the Emotet botnet. However, botnets are very resilient, and they could reemerge after a disruption, causing further incidents.</p>
<h2>Smart world, smart criminals, and zombies</h2>
<p>There’s a lot more that can be said about how smart devices represent further avenues for crooks to exploit unsuspecting users and businesses, and the discussion surrounding data security and privacy is a worthy one.</p>
<p>However, the takeaway from all this is that you should always keep your devices updated, and when that is not possible, try to dispose of them securely (wiping old data), replace them with a new device after <a href="https://www.cisa.gov/news-events/news/proper-disposal-electronic-devices" target="_blank" rel="noopener">secure disposal</a>, or find them a new, much-less-connected purpose.</p>
<p>Outdated devices can be easy targets, so by keeping them disconnected from the internet or discontinuing their use, you can feel safe and secure from any cyber harm through them.</p>
<blockquote><p>Before you go: Toys behaving badly: How parents can protect their family from IoT threats</p></blockquote>
</div>

<p><a style="font-size: 11px; color: #d5dbdb;" href="https://www.welivesecurity.com/en/internet-of-things/old-devices-new-dangers-the-risks-of-unsupported-iot-tech/">Source</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cyberwiredaily.com/the-risks-of-unsupported-iot-tech/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
