Warning: Smart TVs Are The IoT Gateway Into Your Home

The FBI has issued two warnings to New Year consumers intending to buy a new Smart TV and thinking about about other Internet of Things (IoT) connected devices in their home. Internet connected televisions could be used by criminals to hack into your home computer network and spy on your every move. 
 
The FBI warning  cautions the  public that an unsecured TV that is connected to the Internet could be used as a conduit for cyber-criminals to gain virtual entry into a home. Another concern is that hackers can use that innocent device to do a virtual drive-by of your digital life.
 
Unsecured devices can allow hackers a path into your router, giving the bad guy access to everything else on your home network that you thought was secure. In fact, most of the smart home devices you connect to your router have almost no security at all, which means it's important to take steps to secure your home network as a whole. Fortunately, there are a few things you can do to strengthen your security.
 
Use Encryption on Your WiFi Router
You wouldn't believe how many people leave their wireless router open to the public. Considering your WiFi is the entry to your home network, it would be like leaving your front door unlocked and open for anyone to walk in. I think we can all agree that's a bad idea. Instead, use encryption such as WPA2, and use a secure password. 
 
Also, change the name for router to something that isn't associated with your name or your address. That makes it harder for would-be hackers to pinpoint your location based on the name of your network. Also, it should go without saying, but let's just say it: never, ever, ever use the default name or password for any device. 
 
Smart TVs are called that because they connect to the Internet. They allow you to use popular streaming services and apps. Many also have microphones for those of us who are too lazy to actually to pick up the remote. Just shout at your set that you want to change the channel or turn up the volume and you are good to go. A number of the newer TV’s also have built-in cameras. In some cases, the cameras are used for facial recognition so the TV knows who is watching and can suggest programming appropriately. There are also devices coming to market now that allow you to video chat on a domestic big-screen  TV
 
Beyond the risk that your TV manufacturer and app developers may be listening and watching you, that television can also be a gateway for hackers to come into your home.
 
A bad cyber actor may not be able to access your locked-down computer directly, but it is possible that your unsecured TV can give him or her an easy way in the backdoor through your router.Hackers can also take control of your unsecured TV. At the low end of the risk spectrum, they can change channels, play with the volume, and show your kids inappropriate videos. In a worst-case scenario, they can turn on your bedroom TV's camera and microphone and silently cyberstalk you.
 
TVs and Internet of Things technology are a big part of our lives, and they aren’t going away. So how can you protect your family?
  • Know exactly what features your TV has and how to control those features. Do a basic Internet search with your model number and the words “microphone,” “camera,” and “privacy.”
  • Don’t depend on the default security settings. Change passwords if you can, and know how to turn off the microphones, cameras, and collection of personal information if possible. If you can’t turn them off, consider whether you are willing to take the risk of buying that model or using that service.
  • If you can’t turn off a camera but want to, a simple piece of black tape over the camera eye is a back-to-basics option.
  • Check the manufacturer’s ability to update your device with security patches.
  • Check the privacy policy for the TV manufacturer and the streaming services you use. Confirm what data they collect, how they store that data, and what they do with it. 
  • Change the device’s factory settings from the default password.
  • Secure your network. Your fridge and your laptop should not be on the same network. Keep your most private, sensitive data on a separate system from your other IoT devices.
  • Make sure all your devices are updated regularly. If automatic updates are available for software, hardware, and operating systems, turn them on.
Shoppers were also need to be aware of the iportance of checking the privacy policises of both  the TV manufacturer and the streaming services they use and to confirm what data they collect, how they store that data, and what they do with it.
 
FBI:           Infosecurity-Magazine:         Express:       Inc.com
 
You Might Also Read:
 
Finland Has A Cyber Security Standard For IoT:
 
 
« Iran's Cyberwar Response To Its General's Killing
N.Korean Hackers Are Working With European Criminals »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

High-Tech Bridge

High-Tech Bridge

High-Tech Bridge SA is a Swiss MSSP provider offering security auditing, source code review and computer forensics.

Oppida

Oppida

Oppida provides tailored IT security services to help you identify security gaps and assist in finding the most effective remediation.

Appdome

Appdome

Appdome is the industry's first mobile integration as a service company, providing solutions for enterprise mobility and mobile application security.

Galvanize

Galvanize

Galvanize is a leading provider of award-winning, cloud-based security, risk management, compliance, and audit software for some of the world’s largest organizations.

ThreatMark

ThreatMark

ThreatMark provides fraud detection solutions for digital banking and payments.

e-Lock

e-Lock

e-Lock services include IT security consulting and training, security systems integration, managed security and technical support.

Cytelligence

Cytelligence

Cytelligence is a cyber security consulting company with deep expertise in Cyber Breach Response, Cyber Breach Investigations, and Digital Forensics.

Trustonic

Trustonic

Trustonic is a leader in the device security market. Our mission is to protect apps, secure devices & enable trust.

Cryptyk

Cryptyk

CRYPTYK CLOUD is the first complete enterprise-class cloud security solution that includes cloud storage and broad protection against all external and internal threats.

apiiro

apiiro

apiiro invented the industry-first Code Risk Platform™ that uses developers and code behavior analysis to accelerate delivery and automatically remediate product risk.

Cyber Bytes Foundation

Cyber Bytes Foundation

Cyber Bytes Foundation exists to establish and sustain a unique Cyber Ecosystem to accelerate the development of a strong Cyber workforce and support community outreach programs.

Byos

Byos

Byos provides visibility of devices across all networks, regardless of location, integrating with your existing security stack.

Cybertronium

Cybertronium

Cybertronium is a leader in managing cyber risk. We bring you the latest from the complex, ever-evolving online threat environment with the insights to inspire and the expertise to act.

Artjoker

Artjoker

Artjoker is a full cycle software development partner specialized in Blockchain projects and smart contract development including full cycle information security of all projects.

Trustmarque

Trustmarque

Trustmarque delivers customer-centric IT solutions that enable better outcomes. We combine the technology, expertise and services to release value at every stage of the IT lifecycle.

SIGLA Group

SIGLA Group

SIGLA Group specialize in the design and development of IT and OT solutions, from analysis to design, from implementation to commissioning, as well as consultancy, training and assistance.