{"id":41383,"date":"2020-09-25T12:41:26","date_gmt":"2020-09-25T12:41:26","guid":{"rendered":"http:\/\/icloud.pe\/blog\/?guid=0d0a9fcc10d1b0f592de0071d6779cb5"},"modified":"2020-09-25T12:41:26","modified_gmt":"2020-09-25T12:41:26","slug":"kaspersky-blasts-amazons-indoor-drone-as-a-major-security-risk","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/kaspersky-blasts-amazons-indoor-drone-as-a-major-security-risk\/","title":{"rendered":"Kaspersky blasts Amazon&#8217;s indoor drone as a &#8216;major security risk&#8217;"},"content":{"rendered":"<p><span class=\"field field-name-field-author field-type-node-reference field-label-hidden\"><br \/>\n      <span class=\"field-item even\"><a href=\"https:\/\/www.cloudpro.co.uk\/authors\/bobby-hellard\">Bobby Hellard<\/a><\/span><br \/>\n  <\/span><\/p>\n<div class=\"field field-name-field-published-date field-type-datetime field-label-hidden\">\n<div class=\"field-items\">\n<div class=\"field-item even\"><span class=\"date-display-single\">25 Sep, 2020<\/span><\/div>\n<\/p><\/div>\n<\/div>\n<p class=\"short-teaser\">\n<a href=\"https:\/\/www.cloudpro.co.uk\/\" title=\"\" class=\"combined-link\"><\/a><\/p>\n<div class=\"field field-name-body\">\n<p><a href=\"https:\/\/www.itpro.co.uk\/search\/amazon\" data-cke-saved-href=\"https:\/\/www.itpro.co.uk\/search\/amazon\">Amazon<\/a>&#8216;s newly launched smart home security drone presents a &#8220;whole new wave of cyber security risks&#8221;, according to <a href=\"https:\/\/www.itpro.co.uk\/search\/kaspersky\" data-cke-saved-href=\"https:\/\/www.itpro.co.uk\/search\/kaspersky\">Kaspersky<\/a>.<\/p>\n<p>Researchers at the security firm have warned\u00a0that if the technology is compromised it could give hackers a map of a user&#8217;s home and access to sensitive data, including bank details.<\/p>\n<p>The flying camera drone, &#8216;Always Home&#8217;, is the latest product from Amazon&#8217;s Ring division. It&#8217;s a black device that sits in a white docking station that launches when something or someone sets off any home sensors.<\/p>\n<p>The drone is controlled via a smartphone and is capable of capturing\u00a0images which are then sent to the controlling device.<\/p>\n<p>Kaspersky researchers claim it&#8217;s this functionality that\u00a0has the potential to be used against the consumers who buy it.<\/p>\n<p>&#8220;The development of unmanned security drones presents a whole new wave of cyber security risks,&#8221; said David Emm, principal security researcher at Kaspersky. &#8220;If hacked, this smart technology could provide cybercriminals with a complete map of an individual&#8217;s home \u2013\u00a0including the location of valuable items and possible access points to the house.<\/p>\n<p>&#8220;The linked smartphone is also vulnerable to attack. If the connection between the drone and phone is compromised, then hackers can gain access to the individual&#8217;s sensitive data, including contact and banking details.&#8221;<\/p>\n<p>Emm suggests\u00a0that anyone considering buying the miniature security drone, or any smart device for that matter, should take steps to improve security, such as changing any <a href=\"https:\/\/www.itpro.co.uk\/network-internet\/internet-of-things-iot\/354644\/government-moves-to-ban-weak-default-passwords-on\"  data-cke-saved-href=\"https:\/\/www.itpro.co.uk\/network-internet\/internet-of-things-iot\/354644\/government-moves-to-ban-weak-default-passwords-on\">default passwords<\/a>, using <a href=\"https:\/\/www.itpro.co.uk\/security\/30848\/why-wpa3-may-be-no-safer-from-attack-than-wpa2\"  data-cke-saved-href=\"https:\/\/www.itpro.co.uk\/security\/30848\/why-wpa3-may-be-no-safer-from-attack-than-wpa2\">WPA2 encryption<\/a> on home routers and enabling automatic updates.<\/p>\n<p>There have been a number of reports of Amazon <a href=\"https:\/\/www.itpro.co.uk\/cloud-computing\/28037\/what-is-iot\" data-cke-saved-href=\"https:\/\/www.itpro.co.uk\/cloud-computing\/28037\/what-is-iot\">IoT<\/a> products being hacked, or at least found to have vulnerabilities, over the past year.\u00a0In November 2019, researchers found an exploit in the Ring doorbell that allowed hackers to <a href=\"https:\/\/www.itpro.co.uk\/internet-of-things-iot\/34786\/ring-doorbells-leak-users-wi-fi-passwords-in-clear-text\"  data-cke-saved-href=\"https:\/\/www.itpro.co.uk\/internet-of-things-iot\/34786\/ring-doorbells-leak-users-wi-fi-passwords-in-clear-text\">intercept Wi-Fi passwords in clear text<\/a>.<\/p>\n<p>Early in 2020, it was revealed that some hackers could gain access to <a href=\"https:\/\/www.itpro.co.uk\/security\/vulnerability\/356793\/alexa-flaws-may-have-let-hackers-steal-voice-history\"  data-cke-saved-href=\"https:\/\/www.itpro.co.uk\/security\/vulnerability\/356793\/alexa-flaws-may-have-let-hackers-steal-voice-history\">user voice history via an Alexa subdomain attack<\/a>. This was an exploit of a cross-origin resource sharing misconfiguration. <\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>      Bobby Hellard<\/p>\n<p>        25 Sep, 2020    <\/p>\n<p>      Amazon&#8217;s newly launched smart home security drone presents a &#8220;whole new wave of cyber security risks&#8221;, according to Kaspersky.<br \/>\nResearchers at the security firm have warned\u00a0that if the technolog&#8230;<\/p>\n","protected":false},"author":403,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-41383","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/41383","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/403"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=41383"}],"version-history":[{"count":1,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/41383\/revisions"}],"predecessor-version":[{"id":41384,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/41383\/revisions\/41384"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=41383"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=41383"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=41383"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}