Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

These Gifts Can Come with Security Issues

These Gifts Can Come with Security Issues

The holiday season is coming to a close, with meals shared and gifts opened. You may have even received a new gizmo or doodad that you’re looking forward to trying out. Not to burst your bubble, but there is unfortunately a chance that the gizmo you had hoped to get (or purchased for a loved one) may lead to a security breach.

Smart Home Hubs and Assistants
These devices were touted as useful gadgets to have around the house as a mix between a media center and reference source. The trouble with devices like these is that they are always listening for you to speak, with microphones that automatically activate. Think about everything you say in the privacy of your own home. A cybercriminal could listen in, taking that privacy away and quite possibly learning some invaluable information.

To make this situation worse, many “smart home” devices also have cameras, invading your privacy in yet another way.

Admittedly, the thought of controlling one’s house by telling it what to do is, for lack of a better term, pretty cool. However, the questionable security that many of these devices suffer from gives cybercriminals the unique opportunity to spy on you, whether you use the assistant at home or in the office. This is also important to keep in mind if a young person you know recently received one of these devices.

Smart and Connected Toys
While many connected devices are clearly meant for an older demographic, there is an equal amount that are intended for children. For example, many toys are now capable of functioning in a way quite similar to a smart home hub, and others have features that are outright creepy. For example, if a child has a Toymail Talkie, a cybercriminal could use it to communicate directly to that child. Other connected toys offer cybercriminals with intimate details about the schedule of a child. For instance, the connected bath toy, Edwin the Duck, can be used to tell a hacker the general time that a child is in the bath and when they are put down for the night.

Connected and Smart Appliances
Grown-ups have to have their toys, too. Appliances and accessories with “smart” capabilities are becoming increasingly common, but unfortunately lack the security required to protect them from cyberattack and intrusion. Assorted wearable tech, like fitness trackers, and Internet of Things devices, or any of those devices that aren’t a computer or laptop but still utilize the Internet, are becoming more and more popular. Unfortunately, because their security is sub-par, these devices can easily be leveraged as a part of a botnet, or can also be used to extract data from their surroundings.

DNA Tests
It would seem that there was a sizable push to frame these ancestry testing kits as the perfect holiday gift this year, despite there being host to numerous privacy issues. Consider what you have to provide to the company. By handing over a vial of your spit, you’re giving them the most unique piece of personally identifiable information you possess: your genetic code, also known as your DNA.

This information quickly becomes very valuable once the topic of research is brought up.

When using one of these services, there are plenty of agreements to sign. These agreements will often give the company the leeway to use your genetic data as they please, including selling a digitized version to whomever is willing to pay.

Despite the Genetic Information Nondiscrimination Act of 2008 forbidding the use of genetic information to justify discriminatory acts, like firing someone because they have a predisposition to a medical condition, it isn’t easy to prove this kind of discrimination. After all, an employer could easily find some other reason to terminate someone’s employment--the fact that they were predisposed to a medical condition that would keep them out of work would just be a “coincidence.”

While we hope that your holidays were as bright and cheerful as they should be, we don’t want an unexpected data breach to spoil those memories. For more products that could put your security at risk, check out Mozilla’s handy guide.

Did you have any of these items on your wishlist? Is it worth keeping them around despite the risk to your data security? Leave your thoughts on the matter in the comments section!

Which is More Secure, Your Mobile Network or Wi-Fi...
Investing in Innovative Network Security a Must


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 21 April 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Software Hackers Business Computing Backup Managed Service Provider Productivity Workplace Tips Data Hardware Saving Money Business Malware Email IT Support IT Services Hosted Solutions Network Security Google Small Business Efficiency Smartphones Gadgets Quick Tips Mobile Devices Business Continuity User Tips Computer Disaster Recovery Virtualization Mobile Office Network Microsoft Office Server VoIP Social Media Android Smartphone Mobile Device Management Innovation Miscellaneous Upgrade Windows 10 Ransomware Windows Unified Threat Management Remote Monitoring Holiday Operating System Remote Computing Mobile Computing Passwords BYOD Communication Apps Collaboration WiFi Vendor Management Marketing The Internet of Things Facebook Firewall Analytics Cybersecurity History Users Apple Managed IT services Alert Data Management IT Support Productivity communications Internet of Things IT Consultant Phishing Outsourced IT Managed IT Services Save Money Content Filtering BDR Spam App Bring Your Own Device Automation Gmail Office Big data Health Outlook Antivirus Bandwidth Artificial Intelligence Maintenance Virus Information Technology Best Practice Data Backup Going Green Mobile Device Hiring/Firing Wireless Technology Windows 8 Search Browser Managed IT Tech Support Lithium-ion Battery Hard Drives Data Recovery Budget Encryption Hacking IBM Phone System Money Office 365 Update Recovery Printer Employer-Employee Relationship Cost Management Help Desk SaaS Computers Customer Service VPN Two-factor Authentication Cloud Computing Travel Website Administration Education Networking Save Time Document Management Training It Management Saving Time Running Cable Hard Drive Intranet Law Enforcement Government Humor Cybercrime Data storage Risk Management Legal Proactive IT Hosted Solution Wireless Robot Data Loss Twitter Data Breach Compliance Social Engineering Project Management iPhone Black Market Business Intelligence Business Growth Telephone Systems Computer Repair User Disaster End of Support Mobility Fax Server DDoS Securty Solid State Drive Windows 10 Word Flexibility Cortana Password Laptop Digital Payment Avoiding Downtime Hacker Access Control Comparison Downtime Augmented Reality Current Events Tablet PowerPoint Excel Data Security Social Networking Company Culture Text Messaging Computing Virtual Desktop Bitcoin Patch Management Google Maps Identity Theft Gaming Console Documents Programming Emails IT service Heating/Cooling Blockchain Redundancy Virtual Reality Webcam Hack Bluetooth Net Neutrality Retail Private Cloud Computing Infrastructure Experience eWaste Value Monitors Distributed Denial of Service Telephony Trending Public Cloud Co-managed IT YouTube Settings Unified Communications Business Technology Specifications Statistics Safety Social Lifestyle Scam Network Congestion Automobile Politics Streaming Media Inbound Marketing How To Digital Chrome Cryptocurrency Websites Google Docs Tech Terms Start Menu Router Taxes Computer Accessories Cleaning Software as a Service Vulnerabilities Processors Office Tips Uninterrupted Power Supply Mobile Technology Customer Relationship Management Pain Points Regulations USB Presentation Mouse Paperless Office User Error Tech Term Sports Data Protection Relocation GPS cache CCTV Piracy Skype HTML Corporate Profile Television In Internet of Things Notifications Ebay Reliable Computing 3D Assessment Teamwork Best Practives Software License Storage Recycling Scalability Music Upgrades Devices PDF VoIP SharePoint Meetings Pirating Information Adminstration Microserver Keyboard LiFi Consultation Tip of the week Best Available IT Plan Cabling Product Reviews Domains Deep Learning Audit Accountants Evernote Read Administrator Rental Service Supercomputer Memory Turn Key Shortcut Visible Light Communication Virtual Assistant Content Management Emergency Trojan Migration Troubleshooting Worker Machine Learning Wi-Fi Staffing Computer Care Organize Equifax Environment Data Warehousing Employer Employee Relationship Video Surveillance Flash Competition Advertising Google Drive Hard Drive Disposal Vulnerability Desktop LinkedIn Business Owner Licensing Saving ZTime Google Wallet Displays Printing Startup Electricity Windows Server 2008 Botnet Debate Application Unified Threat Management Archive Applications Banking Drones File Sharing Downloads Smart Tech WannaCry Windows 7 Point of Contact Computer Malfunction Language Permissions Time Management Fiber-Optic Digital Signature Mobile Security Entertainment Thin CLient Business Metrics Harddrive Writing Google Calendar Multi-Factor Security switches Freedom of Information Motion Sickness Tracking External Harddrive Touchscreen Fraud Knowledge UTM Analytic Leadership Chromebook Messenger Technology Tips Legislation News Web Server Workers Device Management Work/Life Balance Smart Phones Public Speaking Get More Done email scam Printer Server Multi-factor Authentication Download Books Wireless Headphones Entrepreneur IT consulting Access Fake News online Currency HIPAA Samsung Business Managemenet Device security Electronic Payment CIO G Suite Microchip Reading Windows XP Spyware Microsoft Excel Physical Security Tablets IP Address Society Business Cards Upselling Human Resources Micrsooft Webinar Mobile Payment Sync Hacks Capital Productuvuty CrashOverride 3D Printing Nanotechnology