It is estimated that there are more 22 billion devices linked to a home internet connection around the world, and research suggests this figure could reach 38.6 billion by 2025. While hyper-connectivity offers countless benefits, it also increases the number of available attack points to hackers and invisible intruders.
Check Point research warns that there are five household objects that are being targeted by cybercriminals to spy on individuals in their own home.
“Mobile phones, Smart TVs, computers and toys are just some of the devices being targeted. The number of products that feature a camera or microphone is growing every day, which can become an issue if they are connected to the internet and do not have the necessary security measures in place,” says Nomatter Anderson: Security Engineer at Check Point Africa.
“Taking into account the current lockdown restrictions and the number of people working from home, it is no surprise that cybercriminals are focusing their efforts on possible security breaches in these devices to spy on users and collect a large amount of sensitive information while they are at home.”
The five devices that cybercriminals have targeted includes:
- Televisions: Most televisions on the market today not only incorporate an internet connection but also have a camera and microphone so that users can make video calls through their TV. Many models also have voice controls so a TV can be turned on without touching a remote control. It’s important to remember that these devices can see and hear everything that happens within a particular room, so an apparently innocent-looking object can be used as an attack point for an intruder to gain access to your home. The best way to avoid these risks is to cover the camera when not in use or disable or restrict the permissions of these applications.
- Computers: Desktop and laptop devices can store an infinite amount of data, both personal and work-related, which presents an attractive opportunity for cybercriminals to gain access to them. Both have microphone and camera functions that can be used by third parties to spy on individuals or used for financial gain. Covering the camera or restricting the permissions of the microphone are important security measures to take to protect privacy. It’s also important to install comprehensive security tools that regularly analyse the status of software, applications and documents in order to detect any malicious activity on the computer.
- Mobile phones: The one device that faces constant acquisitions of intruding on people’s private lives is a mobile phone. With the number of functions, a phone incorporates it constantly knows everything from our current location to personal bank details. It’s important to only download applications from recognised sources and check the permissions that have been granted to each app.
- Children’s toys: A vast number of toys sold today incorporate technology, such as drones, robots, remote control aeroplanes, and games consoles, and all have the ability to connect to the internet. However, other more traditional products such as soft toys or dolls have been updated and incorporate the functionality to download a mobile application to access new features. This can pose a risk to children’s privacy. In fact, in some European countries, some toys have been banned for spying on and extracting sensitive data from minors.
- Household appliances: Many smart appliances have the capability to work for us when we are not at home. In 2019, a famous and successful kitchen robot sold in Lidl supermarkets was found to have a built-in microphone that recorded shoppers’ conversations, but it is not the only household appliance to be suspected of spying.
Follow IT News Africa on Twitter