article thumbnail

Data Privacy concerns erupt with Robotic Vacuums

CyberSecurity Insiders

But to all those who are using such devices to keep their homes neat and clean, you better know a fact that such robots when connected to internet can be intercepted by hackers who can then snoop into your homes by hacking the device cameras. But the fact is that you won’t be getting the fancy cleaning reports that others with the tech do.

article thumbnail

Cybersecurity Insights with Contrast CISO David Lindner | 2/9/24

Security Boulevard

Insight #1 From toasters to toothbrushes , the Internet of Things (IoT) continues to wreak havoc on the internet. IoT manufacturers need to do better. As consumers, it's important to balance necessity with risk, just like with everything else.

CISO 64
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Britain introduces IOT Device Security Legislation

CyberSecurity Insiders

Dubbed as “The Product Security and Telecommunications Infrastructure(PSTI) bill, it requests those involved in the manufacturing of Internet of Things such as smart TVs, CCTVs, smart phones and fitness trackers; to follow basic standards while offering service and products to consumers. Well, it’s simple….the

IoT 139
article thumbnail

IoT and Cybersecurity: What’s the Future?

Security Affairs

They continuously send and receive data via the internet and can be the easiest way for a hacker to access your home network. The other main weakness of IoT devices is the vast amounts of data that each one collects and sends. IoT Means Someone Has To Store Loads Of Data. Who has access to the data?

IoT 127
article thumbnail

Episode 254: Dennis Giese’s Revolutionary Robot Vacuum Liberation Movement

The Security Ledger

Security researcher and IoT hacker Dennis Giese talks about his mission to liberate robot vacuums from the control of their manufacturers, letting owners tinker with their own devices and - importantly - control the data they collect about our most intimate surroundings. Meet the IoZ: our Internet of Zombie things Dennis Giese is a Ph.D

IoT 75
article thumbnail

Biden Cybersecurity Strategy: Big Ambitions, Big Obstacles

eSecurity Planet

The initiatives that stand out the most — critical infrastructure security standards, a national data privacy and security law, and liability for security failures — will likely take time and the support of Congress to implement. ” Those fundamental shifts are focused on two core priorities. .”

article thumbnail

5 IoT Security Predictions for 2019

Security Affairs

2018 was the year of the Internet of Things (IoT), massive attacks and various botnets hit smart devices, These are 5 IoT Security Predictions for 2019. We foresee regulations expanding beyond authentication and data privacy, and into more detailed requirements of network security and visibility into device bills of materials.

IoT 88