A recent report from a cyber security firm shows that baby monitors are vulnerable to hackers. Rapid7 who performed the research on baby monitors reports that a hacked camera could provide access to other Wi-Fi-enabled devices in a person’s home, such as a personal computer or security system. Ken Westin, Security Analyst for Tripwire says, “The vulnerabilities associated with these baby monitors are not particularly new, as a number of disturbing actual cases have illustrated.  In many cases security was either not a consideration, or was added as an afterthought in these products.”

[su_note note_color=”#ffffcc” text_color=”#00000″]Ken Westin, Security Analyst for Tripwire :

It is a bit of a paradox that we buy baby monitors and security cameras with the intention of keeping our families and businesses safe, but both can end up putting both at increased risk when security measures are not properly implemented.

The vulnerabilities associated with these baby monitors are not particularly new, as a number of disturbing actual cases have illustrated.  In many cases security was either not a consideration, or was added as an afterthought in these products.

These types of vulnerabilities are also not limited to just the problems in devices identified by the researchers in this report. Consumers and businesses alike need to take into consideration the risks posed by any type of device with a camera in our homes and places of business. Even our laptops have cameras which can pose considerable security and privacy risks.”[/su_note][su_box title=”About Tripwire” style=”noise” box_color=”#336588″]Tripwire logoTripwire is a leading provider of advanced threat, security and compliance solutions that enable enterprises, service providers and government agencies to confidently detect, prevent and respond to cybersecurity threats. Tripwire solutions are based on high-fidelity asset visibility and deep endpoint intelligence combined with business-context and enable security automation through enterprise integration. Tripwire’s portfolio of enterprise-class security solutions includes configuration and policy management, file integrity monitoring, vulnerability management and log intelligence.[/su_box]

Subscribe
Notify of
guest
0 Expert Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x