facebook linkedin twitter

These Gifts Can Come with Security Issues

These Gifts Can Come with Security Issues

The holiday season is coming to a close, with meals shared and gifts opened. You may have even received a new gizmo or doodad that you’re looking forward to trying out. Not to burst your bubble, but there is unfortunately a chance that the gizmo you had hoped to get (or purchased for a loved one) may lead to a security breach.

Smart Home Hubs and Assistants
These devices were touted as useful gadgets to have around the house as a mix between a media center and reference source. The trouble with devices like these is that they are always listening for you to speak, with microphones that automatically activate. Think about everything you say in the privacy of your own home. A cybercriminal could listen in, taking that privacy away and quite possibly learning some invaluable information.

To make this situation worse, many “smart home” devices also have cameras, invading your privacy in yet another way.

Admittedly, the thought of controlling one’s house by telling it what to do is, for lack of a better term, pretty cool. However, the questionable security that many of these devices suffer from gives cybercriminals the unique opportunity to spy on you, whether you use the assistant at home or in the office. This is also important to keep in mind if a young person you know recently received one of these devices.

Smart and Connected Toys
While many connected devices are clearly meant for an older demographic, there is an equal amount that are intended for children. For example, many toys are now capable of functioning in a way quite similar to a smart home hub, and others have features that are outright creepy. For example, if a child has a Toymail Talkie, a cybercriminal could use it to communicate directly to that child. Other connected toys offer cybercriminals with intimate details about the schedule of a child. For instance, the connected bath toy, Edwin the Duck, can be used to tell a hacker the general time that a child is in the bath and when they are put down for the night.

Connected and Smart Appliances
Grown-ups have to have their toys, too. Appliances and accessories with “smart” capabilities are becoming increasingly common, but unfortunately lack the security required to protect them from cyberattack and intrusion. Assorted wearable tech, like fitness trackers, and Internet of Things devices, or any of those devices that aren’t a computer or laptop but still utilize the Internet, are becoming more and more popular. Unfortunately, because their security is sub-par, these devices can easily be leveraged as a part of a botnet, or can also be used to extract data from their surroundings.

DNA Tests
It would seem that there was a sizable push to frame these ancestry testing kits as the perfect holiday gift this year, despite there being host to numerous privacy issues. Consider what you have to provide to the company. By handing over a vial of your spit, you’re giving them the most unique piece of personally identifiable information you possess: your genetic code, also known as your DNA.

This information quickly becomes very valuable once the topic of research is brought up.

When using one of these services, there are plenty of agreements to sign. These agreements will often give the company the leeway to use your genetic data as they please, including selling a digitized version to whomever is willing to pay.

Despite the Genetic Information Nondiscrimination Act of 2008 forbidding the use of genetic information to justify discriminatory acts, like firing someone because they have a predisposition to a medical condition, it isn’t easy to prove this kind of discrimination. After all, an employer could easily find some other reason to terminate someone’s employment--the fact that they were predisposed to a medical condition that would keep them out of work would just be a “coincidence.”

While we hope that your holidays were as bright and cheerful as they should be, we don’t want an unexpected data breach to spoil those memories. For more products that could put your security at risk, check out Mozilla’s handy guide.

Did you have any of these items on your wishlist? Is it worth keeping them around despite the risk to your data security? Leave your thoughts on the matter in the comments section!

Which is More Secure, Your Mobile Network or Wi-Fi...
Investing in Innovative Network Security a Must
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, October 23, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Business Computing Software Hackers Microsoft Backup Managed Service Provider Workplace Tips Productivity Data Hardware Saving Money Business Email Malware Network Security IT Services IT Support Efficiency Hosted Solutions Google Small Business Computer Smartphones User Tips Quick Tips Gadgets Mobile Devices Business Continuity Disaster Recovery Innovation Microsoft Office Mobile Office Android Virtualization Network Social Media VoIP Server Mobile Device Management Miscellaneous Collaboration Smartphone Communication Ransomware Windows 10 Upgrade Windows Data Recovery Unified Threat Management Data Backup IT Support Tech Term Passwords Operating System Remote Monitoring Vendor Management Managed IT services Holiday BYOD Remote Computing Productivity Mobile Computing communications WiFi Cybersecurity Apps Facebook BDR The Internet of Things Analytics Marketing Automation History Firewall Apple Users Data Management Outsourced IT Mobile Device Internet of Things Phishing Managed IT Services Alert IT Consultant Browser Artificial Intelligence App Save Money Big data Going Green Spam Health Bandwidth Bring Your Own Device Gmail Antivirus Office Encryption Content Filtering Maintenance Virus Tech Support Office 365 Hiring/Firing Hard Drives Budget Help Desk Managed IT Two-factor Authentication Wireless Technology Search Outlook Windows 8 Cybercrime Lithium-ion Battery Printer Cost Management Best Practice Information Technology Training Money IBM Document Management Business Technology Phone System Computers Saving Time VPN Cloud Computing Travel Recovery Employer-Employee Relationship Update Hacking Access Control SaaS Hard Drive Running Cable Law Enforcement Proactive IT It Management Customer Service Compliance Data storage Administration Intranet Website Education Government Windows 10 Risk Management Legal Networking Humor Regulations Save Time Hacker Excel Information Downtime Sports Disaster Computing Comparison Tablet Hosted Solution Customer Relationship Management End of Support Company Culture Robot Augmented Reality File Sharing PowerPoint Computer Repair Data Security Securty User Social Networking Patch Management Blockchain Solid State Drive Current Events Mobility Applications Data Loss Wireless Social Engineering Twitter Black Market DDoS Flexibility Data Breach Laptop Fax Server Business Growth Avoiding Downtime Project Management Word iPhone Machine Learning Business Intelligence Password Cortana Digital Payment Paperless Office Telephone Systems Software as a Service Unified Communications Settings Router Management Public Cloud Uninterrupted Power Supply Processors Computer Accessories USB Vulnerabilities Bitcoin Presentation Identity Theft Healthcare Trending Data Protection Gaming Console Mouse Vendor IT service Google Maps Specifications Safety Virtual Desktop Webcam Virtual Reality Programming Social Text Messaging Politics Statistics Bluetooth User Error Automobile Network Congestion Documents Co-managed IT Emails Scam Entertainment Chromebook Heating/Cooling Redundancy Cryptocurrency Storage Computing Infrastructure Hack Managed Service How To Streaming Media Google Docs Conferencing Inbound Marketing Lifestyle Private Cloud Experience Download Cleaning Retail Digital Monitors Office Tips eWaste Telephony Monitoring Net Neutrality Websites Start Menu Tech Terms Pain Points Taxes Chrome Value Distributed Denial of Service Mobile Technology YouTube Microsoft Excel HIPAA Multi-factor Authentication G Suite Computer Care Micrsooft Environment Employer Employee Relationship Dark Web Get More Done Migration Connected Devices Licensing Drones Electronic Payment Upselling Hacks Wireless Headphones Physical Security Telephone online Currency Health IT Google Drive Windows Server 2008 Competition Tablets Vulnerability Business Owner Printer Server Banking Equifax Botnet Fleet Tracking Spyware Mobile Payment Video Surveillance Turn Key Relocation Network Management Bookmark Permissions Language IP Address Saving ZTime Trojan Device security Sync MSP Electricity Printing LinkedIn Application Desktop Finance Human Resources Organize Notifications Nanotechnology CCTV Social Network Windows 7 Reliable Computing Service Level Agreement Skype Music Harddrive Business Metrics Startup Computer Malfunction Asset Tracking Archive cache Television switches Writing Business Cards Debate Browsers In Internet of Things Username WannaCry Downloads Upgrades GPS Unified Threat Management Backup and Disaster Recovery Digital Signature External Harddrive Gamification Point of Contact Corporate Profile Screen Reader Customer Resource management User Tip Time Management Freedom of Information LiFi Piracy Scalability Upload Webinar Smart Tech Motion Sickness Distribution Assessment SharePoint Teamwork Data Analysis Tip of the week Work/Life Balance Thin CLient HTML Google Calendar Deep Learning 3D Fiber-Optic Ebay Messenger Database Tracking Visible Light Communication Memory Smart Phones Mobile Security Analytic VoIP PDF Rental Service Meetings Telephone System Recycling Touchscreen News Software License Trends Cabling Product Reviews Knowledge Multi-Factor Security Web Server Cost Consultation Evernote IT consulting Best Available Keyboard Virtual Assistant Domains Leadership Wi-Fi Devices Administrator Read Technology Tips Adminstration Fraud Pirating Information Books Tactics Workers Advertising Flash Public Speaking Best Practives UTM Content Audit CIO Supercomputer Proxy Server Fake News IT Plan Enterprise Resource Planning Worker Staffing Google Wallet Microchip Legislation Error Device Management Electronic Medical Records Data Warehousing Windows XP Shortcut Business Managemenet Emergency Hard Drive Disposal Society Troubleshooting Accountants A.I. Content Management Access Displays Entrepreneur email scam Microserver Reading Addiction Samsung Productuvuty CrashOverride Managing Stress Printers 3D Printing Fileless Malware Regulation Capital

toner1