These Gifts Can Come with Security Issues

These Gifts Can Come with Security Issues

The holiday season is coming to a close, with meals shared and gifts opened. You may have even received a new gizmo or doodad that you’re looking forward to trying out. Not to burst your bubble, but there is unfortunately a chance that the gizmo you had hoped to get (or purchased for a loved one) may lead to a security breach.

Smart Home Hubs and Assistants
These devices were touted as useful gadgets to have around the house as a mix between a media center and reference source. The trouble with devices like these is that they are always listening for you to speak, with microphones that automatically activate. Think about everything you say in the privacy of your own home. A cybercriminal could listen in, taking that privacy away and quite possibly learning some invaluable information.

To make this situation worse, many “smart home” devices also have cameras, invading your privacy in yet another way.

Admittedly, the thought of controlling one’s house by telling it what to do is, for lack of a better term, pretty cool. However, the questionable security that many of these devices suffer from gives cybercriminals the unique opportunity to spy on you, whether you use the assistant at home or in the office. This is also important to keep in mind if a young person you know recently received one of these devices.

Smart and Connected Toys
While many connected devices are clearly meant for an older demographic, there is an equal amount that are intended for children. For example, many toys are now capable of functioning in a way quite similar to a smart home hub, and others have features that are outright creepy. For example, if a child has a Toymail Talkie, a cybercriminal could use it to communicate directly to that child. Other connected toys offer cybercriminals with intimate details about the schedule of a child. For instance, the connected bath toy, Edwin the Duck, can be used to tell a hacker the general time that a child is in the bath and when they are put down for the night.

Connected and Smart Appliances
Grown-ups have to have their toys, too. Appliances and accessories with “smart” capabilities are becoming increasingly common, but unfortunately lack the security required to protect them from cyberattack and intrusion. Assorted wearable tech, like fitness trackers, and Internet of Things devices, or any of those devices that aren’t a computer or laptop but still utilize the Internet, are becoming more and more popular. Unfortunately, because their security is sub-par, these devices can easily be leveraged as a part of a botnet, or can also be used to extract data from their surroundings.

DNA Tests
It would seem that there was a sizable push to frame these ancestry testing kits as the perfect holiday gift this year, despite there being host to numerous privacy issues. Consider what you have to provide to the company. By handing over a vial of your spit, you’re giving them the most unique piece of personally identifiable information you possess: your genetic code, also known as your DNA.

This information quickly becomes very valuable once the topic of research is brought up.

When using one of these services, there are plenty of agreements to sign. These agreements will often give the company the leeway to use your genetic data as they please, including selling a digitized version to whomever is willing to pay.

Despite the Genetic Information Nondiscrimination Act of 2008 forbidding the use of genetic information to justify discriminatory acts, like firing someone because they have a predisposition to a medical condition, it isn’t easy to prove this kind of discrimination. After all, an employer could easily find some other reason to terminate someone’s employment--the fact that they were predisposed to a medical condition that would keep them out of work would just be a “coincidence.”

While we hope that your holidays were as bright and cheerful as they should be, we don’t want an unexpected data breach to spoil those memories. For more products that could put your security at risk, check out Mozilla’s handy guide.

Did you have any of these items on your wishlist? Is it worth keeping them around despite the risk to your data security? Leave your thoughts on the matter in the comments section!

Which is More Secure, Your Mobile Network or Wi-Fi...
Investing in Innovative Network Security a Must


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, July 17, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Software Microsoft Business Computing Hackers Managed Service Provider Backup Workplace Tips Productivity Data Hardware Saving Money Business Malware Email IT Support IT Services Hosted Solutions Network Security Google Small Business Efficiency Smartphones Gadgets Quick Tips Business Continuity User Tips Mobile Devices Computer Disaster Recovery Mobile Office Virtualization Network Android Innovation Microsoft Office Server VoIP Mobile Device Management Social Media Smartphone Windows 10 Upgrade Miscellaneous Unified Threat Management Windows Ransomware Remote Monitoring Operating System Passwords Holiday Mobile Computing BYOD Remote Computing Collaboration Communication Apps Cybersecurity Managed IT services WiFi Vendor Management Marketing Facebook IT Support Data Backup The Internet of Things Data Recovery Analytics Firewall History Users Apple Productivity Alert Data Management Internet of Things communications BDR Automation Tech Term Save Money Artificial Intelligence Outsourced IT Phishing App Managed IT Services IT Consultant Office Bring Your Own Device Big data Bandwidth Spam Content Filtering Health Gmail Going Green Mobile Device Outlook Wireless Technology Windows 8 Cost Management Antivirus Search Maintenance Printer Tech Support Managed IT Virus Budget Hiring/Firing Best Practice Information Technology Hard Drives Encryption Lithium-ion Battery Browser Cybercrime Travel Help Desk Hacking Update Office 365 Money Document Management IBM Phone System Recovery Computers Employer-Employee Relationship Regulations Intranet Education SaaS Administration Risk Management Training Windows 10 Humor Law Enforcement Save Time Hard Drive Compliance Data storage Customer Service Two-factor Authentication Running Cable Cloud Computing Proactive IT Government Website Saving Time Legal It Management Networking Business Technology VPN Word Twitter Applications PowerPoint Patch Management Blockchain Data Loss Paperless Office Password Cortana Telephone Systems Fax Server Disaster Data Breach Hosted Solution Hacker End of Support Robot Business Intelligence Securty Project Management Digital Payment Avoiding Downtime Solid State Drive User Downtime iPhone Comparison Tablet Black Market Mobility Flexibility Social Engineering Company Culture Wireless Access Control Computer Repair Laptop Excel DDoS Social Networking Business Growth Current Events Customer Relationship Management Data Security Augmented Reality Gaming Console Retail Telephony YouTube eWaste Unified Communications Value Settings Text Messaging Taxes Streaming Media Sports Webcam Scam Machine Learning Computing Lifestyle Distributed Denial of Service Redundancy Net Neutrality Processors Public Cloud USB IT service Digital Chrome Identity Theft Presentation Inbound Marketing Websites Router Start Menu Tech Terms Bluetooth Virtual Desktop Mobile Technology Specifications Safety Google Maps Computer Accessories Social Virtual Reality Software as a Service Politics Pain Points Automobile Trending Vulnerabilities Cryptocurrency Emails Documents Uninterrupted Power Supply Healthcare Heating/Cooling Chromebook Google Docs Mouse Computing Infrastructure Hack Experience Storage Bitcoin How To Statistics Cleaning Programming Monitors Data Protection Download User Error Network Congestion Office Tips Private Cloud Co-managed IT Windows XP WannaCry Downloads Wi-Fi Administrator Gamification Staffing Google Wallet Domains Books Webinar Workers Screen Reader Piracy Upload Society Public Speaking Debate Time Management Freedom of Information Supercomputer Smart Tech Harddrive Displays Corporate Profile Recycling Fiber-Optic Database GPS Shortcut Assessment SharePoint Microchip Analytic HTML Micrsooft Worker Entrepreneur Google Calendar Product Reviews Mobile Security External Harddrive Drones Troubleshooting Tip of the week Reading Samsung Conferencing VoIP G Suite Software License Trends HIPAA Touchscreen News Employer Employee Relationship Read Multi-Factor Security Environment Licensing Fraud Tactics Permissions 3D Language Competition Ebay Consultation Evernote Hacks Best Practives Physical Security Devices Electronic Payment Thin CLient Knowledge Monitoring Technology Tips Banking Botnet UTM Content Smart Phones Business Owner Virtual Assistant Relocation Tablets Device Management Audit Sync Microserver Business Managemenet IT Plan Enterprise Resource Planning Music IP Address Fake News File Sharing Content Management Legislation switches Writing email scam Addiction Adminstration Application Pirating Information Data Warehousing Notifications CCTV Accountants Upgrades Leadership Human Resources Management LiFi Access Business Metrics Get More Done Computer Malfunction Multi-factor Authentication Information Emergency Hard Drive Disposal Reliable Computing online Currency Computer Care In Internet of Things Turn Key Migration Connected Devices Microsoft Excel Printer Server Wireless Headphones LinkedIn Network Management Digital Signature Work/Life Balance Google Drive Windows Server 2008 Trojan Equifax Deep Learning Visible Light Communication Teamwork Memory Spyware Mobile Payment Motion Sickness Device security Entertainment Vulnerability Scalability Organize IT consulting Upselling Electricity Printing Skype Desktop Finance Messenger Tracking Archive Nanotechnology Business Cards Service Level Agreement Video Surveillance Windows 7 Rental Service Meetings Startup PDF Unified Threat Management Backup and Disaster Recovery Advertising Best Available Flash Keyboard cache Television Web Server Point of Contact CIO Saving ZTime Cabling CrashOverride Managing Stress Capital Productuvuty MSP 3D Printing Username