Baby monitors have evolved from simple one-way radio communications based on older radio waves to highly evolved IP based, internet-connected cameras that can be viewed on a smartphone or tablet. Back in the day, when cordless phones were 900 MHZ, it was common to hear someone else’s conversations on your own phone or easy enough to eavesdrop on anyone’s call with a store-bought scanner.
Today’s baby monitors suffer a similar fate. While it’s all wonderful for a parent who wants to check out their little Johnny from afar, there are security issues with wireless technology if not properly locked down.
CBS New York reports, “The Gilberts, a family in Texas, found that a hacker gained access to their video baby monitor and was yelling at their 2-year-old daughter by name, having read it off her bedroom wall. ‘He was saying, “Wake up, Allyson, you little (expletive),” said the girl’s father, Marc Gilbert. ‘It felt like somebody broke into our house.’”
Out of the box, most of these wireless technologies that allow people to control various home appliances from their smartphones are generally secure. However, in some cases, software or firmware may need updating if vulnerabilities are found.
- Always check with a device manufacturer’s website to ensure the latest software/firmware or critical updates are installed or available to install.
- Most wireless vulnerabilities start at the home/office wireless network and not on the devices themselves. It is essential to encrypt wireless with at least the WPA standard built into your router’s software.
- Just like you need to encrypt wireless for your home/office network, you also need to encrypt wireless on public or free networks to protect the data on your devices. Hotspot Shield VPN is a free VPN option that encrypts all wireless communications.
Robert Siciliano is an Identity Theft Expert to Hotspot Shield VPN. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security on Good Morning America. Disclosures. For Roberts FREE ebook text- SECURE Your@emailaddress -to 411247.
ROBERT SICILIANO, CEO of IDTheftSecurity.com is fiercely committed to informing, educating, and empowering Americans so they can be protected from violence and crime in the physical and virtual worlds. His "tell it like it is" style is sought after by major media outlets, executives in the C-Suite of leading corporations, meeting planners, and community leaders to get the straight talk they need to stay safe in a world in which physical and virtual crime is commonplace. Siciliano is accessible, real, professional, and ready to weigh in and comment at a moment's notice on breaking news.
- Cellular Base Station Range Extenders Vulnerable to Attack
Low-powered cellular base stations are often found in residential homes and small businesses where mobile coverage is scant. The device, which also known as a femtocell, connects to DSL or cable connections and extends cellular coverage to a functional level where cell towers simply don’t reach. Some cellular base stations can accommodate up to 16
- 6 Ways You Are Vulnerable On Wi-Fi
Whether you are on your home or office network or seeking out a free connection on public Wi-Fi, there are known risks that can be managed simply by using a free VPN. #1. Outdated operating system-critical security patches. When an operating system is released, it often is secure—or at least as it can be for the moment.
- Stop, Think and Connect on Public Wi-Fi
OnGuardOnline.gov, co-managed by the Federal Trade Commission, is the federal government’s website to help you be safe, secure and responsible online.OnGuardOnline.gov is a partner in the Stop Think Connect campaign, led by the Department of Homeland Security, and part of the National Initiative for Cybersecurity Education, led by the National Institute of Standards and Technology. Vulnerabilities I,
- Crack Your WiFi Password To Protect Yourself
Ever wanted to be a hacker? Today, anyone can learn code and understand the ins and outs of all the technology we are simultaneously blessed and cursed with. But once you know how all this technology works to the point of calling yourself a hacker (which, by the way, isn’t necessarily a bad word), then
- What Kind of Wireless is Secure…and What Isn’t?
Wi-Fi was born to be convenient—but not secure. More than anything, though, it depends more on what kind of wireless we’re talking about. Public. Free, unsecured Wi-Fi is the least secure. Shared Wi-Fi in public, at home or in the office lacks encryption of the data packets streaming from the connected devices. In other words, your data