Warning: Smart TVs Are The IoT Gateway Into Your Home

The FBI has issued two warnings to New Year consumers intending to buy a new Smart TV and thinking about about other Internet of Things (IoT) connected devices in their home. Internet connected televisions could be used by criminals to hack into your home computer network and spy on your every move. 
 
The FBI warning  cautions the  public that an unsecured TV that is connected to the Internet could be used as a conduit for cyber-criminals to gain virtual entry into a home. Another concern is that hackers can use that innocent device to do a virtual drive-by of your digital life.
 
Unsecured devices can allow hackers a path into your router, giving the bad guy access to everything else on your home network that you thought was secure. In fact, most of the smart home devices you connect to your router have almost no security at all, which means it's important to take steps to secure your home network as a whole. Fortunately, there are a few things you can do to strengthen your security.
 
Use Encryption on Your WiFi Router
You wouldn't believe how many people leave their wireless router open to the public. Considering your WiFi is the entry to your home network, it would be like leaving your front door unlocked and open for anyone to walk in. I think we can all agree that's a bad idea. Instead, use encryption such as WPA2, and use a secure password. 
 
Also, change the name for router to something that isn't associated with your name or your address. That makes it harder for would-be hackers to pinpoint your location based on the name of your network. Also, it should go without saying, but let's just say it: never, ever, ever use the default name or password for any device. 
 
Smart TVs are called that because they connect to the Internet. They allow you to use popular streaming services and apps. Many also have microphones for those of us who are too lazy to actually to pick up the remote. Just shout at your set that you want to change the channel or turn up the volume and you are good to go. A number of the newer TV’s also have built-in cameras. In some cases, the cameras are used for facial recognition so the TV knows who is watching and can suggest programming appropriately. There are also devices coming to market now that allow you to video chat on a domestic big-screen  TV
 
Beyond the risk that your TV manufacturer and app developers may be listening and watching you, that television can also be a gateway for hackers to come into your home.
 
A bad cyber actor may not be able to access your locked-down computer directly, but it is possible that your unsecured TV can give him or her an easy way in the backdoor through your router.Hackers can also take control of your unsecured TV. At the low end of the risk spectrum, they can change channels, play with the volume, and show your kids inappropriate videos. In a worst-case scenario, they can turn on your bedroom TV's camera and microphone and silently cyberstalk you.
 
TVs and Internet of Things technology are a big part of our lives, and they aren’t going away. So how can you protect your family?
  • Know exactly what features your TV has and how to control those features. Do a basic Internet search with your model number and the words “microphone,” “camera,” and “privacy.”
  • Don’t depend on the default security settings. Change passwords if you can, and know how to turn off the microphones, cameras, and collection of personal information if possible. If you can’t turn them off, consider whether you are willing to take the risk of buying that model or using that service.
  • If you can’t turn off a camera but want to, a simple piece of black tape over the camera eye is a back-to-basics option.
  • Check the manufacturer’s ability to update your device with security patches.
  • Check the privacy policy for the TV manufacturer and the streaming services you use. Confirm what data they collect, how they store that data, and what they do with it. 
  • Change the device’s factory settings from the default password.
  • Secure your network. Your fridge and your laptop should not be on the same network. Keep your most private, sensitive data on a separate system from your other IoT devices.
  • Make sure all your devices are updated regularly. If automatic updates are available for software, hardware, and operating systems, turn them on.
Shoppers were also need to be aware of the iportance of checking the privacy policises of both  the TV manufacturer and the streaming services they use and to confirm what data they collect, how they store that data, and what they do with it.
 
FBI:           Infosecurity-Magazine:         Express:       Inc.com
 
You Might Also Read:
 
Finland Has A Cyber Security Standard For IoT:
 
 
« Iran's Cyberwar Response To Its General's Killing
N.Korean Hackers Are Working With European Criminals »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

QTS

QTS

QTS Realty Trust, Inc. is a leading provider of secure, compliant data center, hybrid cloud and managed services.

Adlink Technology

Adlink Technology

ADLINK is a leading provider of embedded computing products and services for applications including IoT and industrial automation.

Physec

Physec

Physec offers innovative security products and solutions for the Internet of Things ecosystem.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Rezilion

Rezilion

Rezilion is a stealth mode cyber-security start-up developing a cutting edge technology that makes cloud environments self-protecting and resilient to cyber-attacks.

Startupbootcamp Fintech & Cybersecurity

Startupbootcamp Fintech & Cybersecurity

Startupbootcamp is the world’s largest network of multi-corporate backed accelerators helping startups scale internationally.

David Hayes-Export Controls

David Hayes-Export Controls

David Hayes-Export Controls provides assistance to companies affected by export controls or who are considering entering the market but are unsure of the commercial and regulatory implications.

Shearwater Group

Shearwater Group

Shearwater Group is an award-winning organisational resilience group that provides cyber security, advisory and managed security services to help secure businesses in a connected global economy.

Talion

Talion

Talion aim to reduce the complexity involved in securing your organisation and to give security teams unrivalled visibility into their security operations, so they can make optimal decisions, fast.

SoftForum

SoftForum

SoftForum is a company specializing in next-generation information security solutions in the Quantum-Resistant-Cryptography (PQC) field.

Corona IT Solutions

Corona IT Solutions

At Corona IT Solutions, our team of specialists in networking, wireless and VoIP are dedicated to providing proactive monitoring and management of your IT systems.

Whitaker Brothers

Whitaker Brothers

Whitaker Brothers data destruction equipment can be found in 115 countries and every single continent in the world, from major military organizations to small offices.

Boecore

Boecore

Boecore is an aerospace and defense engineering company that specializes in software solutions, systems engineering, cybersecurity, enterprise networks, and mission operations.

Applied Connective Technologies

Applied Connective Technologies

Applied Connective is one team for all your technology needs, from IT to phones, cyber security to physical security, audio/video and the infrastructure to support it.

CaseMatrix

CaseMatrix

Discover a new era of legal intelligence with CaseMatrix. We identify potential class action cases arising from cyber incidents and data breaches.

Triovega

Triovega

Triovega are a leading provider for production security and efficiency. Our solutions enhance OT security, and reduce production downtime.