Netimperative
Netimperative
  • Home
  • Ads
  • Content
  • Mobile
  • E-commerce
  • Social
  • Regulation
  • Video
  • Viral
Menu
  • Apple
  • Amazon
  • Facebook
  • Google
  • twitter
  • WhatsApp
  • YouTube

Video viral of the week: Security team hack into family’s Alexa

August 10, 2018

As one of the most dominant smart devices on the market, do we really know what, and who, we’re welcoming into our homes when purchasing a secondhand Amazon Echo? In this video, online security experts vpnMentor investigated the accessibility of Amazon Echo by hacking into one unsuspecting family’s device – highlighting how easily it could be tampered with.

127 million smart home units are expected to be sold in the US in 2018, with the global smart home market expected to be worth $53.45 billion by 2022. With 55% of smart device owners in the dark about how they actually work, could those who bought second-hand smart home devices be welcoming a threat to their families into their homes?

Internet security experts vpnMentor have utilised a team of ethical hackers to uncover the most hackable smart home devices including the first-generation Amazon Echo, a Samsung Smart Camera and the first-generation Ring Smart Doorbell.

vpnMentor have produced a video which shows just how you’re inviting hackers into your home, and how easy it can be for them to access your sensitive information. Disturbingly, the team were able to manipulate all of the devices tested to gain access to your home.

Amazon Echo – A wiretap waiting to happen?

Our research revealed a critical vulnerability related to the first-generation Echo’s physical design. Hackers were able to open the device up and manipulate it using a specially crafted SD card. This means that malicious actors could live stream audio from its microphone, and remotely use its services.

Keeping Cyber Criminals At Bay

With such terrifying findings, vpnMentor wants to highlight just how simple it is for your home to be targeted by malicious hackers.

However, the experts at vpnMentor have compiled a list of recommendations to protect users from becoming an easy target:

• Always research a product, and any existing security threats to it, before you buy.
• Only buy your smart gadget from an officially certified source.
• Be aware of any signs of physical intervention with the product.
• Directly address the seller if you or someone else has identified any major misconfiguration.
• Make sure your smart device is properly configured and regularly updated.
• Keep your externally facing smart devices on a separate network.

Ariel Hochstadt, co-founder of vpnMentor, commented: “If you are going to introduce smart technology into your home, it is important that you remain attentive with your devices to ensure that only those you trust have access. By following our set of simple rules you can ensure the best security practices have been met and saving you from becoming an easy target for crime.”
You can also watch their video investigation here to see how one unsuspecting family was affected after their devices were hacked.

All devices mentioned were purchased and hacked by a team of ethical hackers in March-April 2018. Full details can be found in the whitepaper. Although all hacks took place in real-life, the scenes depicted in the video are a reconstruction of a scenario that would have been possible with the vulnerabilities uncovered.

https://www.vpnmentor.com/

E-commerce, News, Regulation, Video, Viral Amazon, global, Samsung, security, technology

Archives

Tags

advertising agencies Amazon analytics Android Apple apps Australia BBC brands Brazil broadband China Christmas comScore content digital marketing ecommerce email Entertainment Europe Facebook France games Germany global Google government images infographic local marketing media Microsoft music Privacy retail Search security smartphones technology Twitter UK video YouTube

Recent Posts

  • Top six Valentine’s Day ads for 2022
  • 2021 Halloween: digital marketing campaigns we loved this year
  • Empowering employees; the critical link between EX and CX
  • Investing in in-app social features is a must in a world that is crying out to be connected
  • QR codes, Gen Z and the future of OOH

Copyright © 2025 Netimperative.

Magazine WordPress Theme by themehall.com

We use cookies to improve the website and your experience. We’ll assume you’re okay with this, but you’re welcome to opt-out
Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT