Smart Devices: Convenience or Security Risk? Investigative Report Reveals Vulnerabilities
Explore how easily smart home devices can be hacked, exposing personal data. Learn essential tips to protect your home from cyber threats.
File
Ethical hacker shows us how easily smart devices can be hacked and give access to your personal info
Added on 09/07/2024
Speakers
add Add new speaker

Speaker 1: Smart devices that hook up to the Internet and can be controlled by your phone. Those will be hot items this holiday season.

Speaker 2: Yes, indeed, and tonight these devices are the focus of a demonstration you really need to see. 5 on your side. Investigator Jonathan Walsh shows us just how easy it is to hack your home.

Speaker 3: Well, I can see who's in the driveway and who's coming up the front walk

Speaker 4: and who's at the front door. Gloria Bevan has a ring camera system, a smart TV and a wireless printer. She's worried about just how exposed she is. I don't like that you have access to what I'm doing in my house, so we started with one of Gloria's neighbors. We are in an undisclosed location in our mobile unit. Our ethical hacker Rob is going to show us how it's done. A lot of these things can be done pretty easily. Rob Simon has been hacking for years. He tells us a simple tossed out light bulb. Can trash your personal accounts.

Speaker 5: We can pull the internals of that out and then we can look for the flash lights that are on there that store all of the information as well as the settings for connecting to your network. He extracted potentially damaging info like

Speaker 4: passwords all with the help of this. You can get this anywhere. Yeah, you can get this anywhere. This is just a cheap device. It costs about $15 while sitting in our van. Rob was able to gain control of this thermostat using just commonly known passwords. Not only can he create problems with freezing out the home, but it's a high tech way of casing the house using the calendar on the thermostat. Maybe he's scheduling a lower

Speaker 5: temperature than you would typically use for, say, about a week. It might be possible that the user is going to be on vacation during that time, so they might not be home.

Speaker 4: Funny thing is, the house Rob just hacked belongs to Alex Hammerstone from Trusted Set who helped us with this demonstration.

Speaker 1: If you use the same password across multiple sites, your account is only going to be as secure as the weakest site where you use it.

Speaker 4: Problems are prevalent. Data breaches are happening all the time, affecting millions of people's private info. People are paying to get this type

Speaker 5: of information. There's always going to be people out there that are going to be doing it. Plus, a quick Google search shows

Speaker 4: hacking courses popping up in under a second. We found hackers presentations on YouTube.

Speaker 1: Hack all the things. 20 devices in 45 minutes.

Speaker 4: It's such a massive worldwide issue that hits the US hard. It's like leaving your blinds open and a bunch of people looking in at you. A previous five on your side investigation found a website that's hacked into thousands of cameras online for anyone to see medical procedures. A naked man and children. Plenty of them in schools, in daycares and at home. We found a local victim whose home camera was hacked. Should have been very much more diligent about realizing that's a window into your home with so many Internet connected products out there. Even microwaves, vacuums and door locks. The experts say it's time for all of us, not just Gloria, especially for older people like me. We don't really know what we're doing with this stuff. To use protections like multilayer authentication where a text can tell if it's you in an account,

Speaker 5: that's going to help prevent someone from gaining access, even if they did have your credentials

Speaker 4: and pay a lot more attention to our Internet connected products.

Speaker 1: People oftentimes think of their technology devices like a toaster, which you buy, you use for 20 years, and then you another one. But really, it's a lot more like a car. It requires updates and maintenance.

Speaker 4: So let's close the door on the criminals. I'm 5 on your side. Investigator Jonathan Walsh.

ai AI Insights
Summary

Generate a brief summary highlighting the main points of the transcript.

Generate
Title

Generate a concise and relevant title for the transcript based on the main themes and content discussed.

Generate
Keywords

Identify and highlight the key words or phrases most relevant to the content of the transcript.

Generate
Enter your query
Sentiments

Analyze the emotional tone of the transcript to determine whether the sentiment is positive, negative, or neutral.

Generate
Quizzes

Create interactive quizzes based on the content of the transcript to test comprehension or engage users.

Generate
{{ secondsToHumanTime(time) }}
Back
Forward
{{ Math.round(speed * 100) / 100 }}x
{{ secondsToHumanTime(duration) }}
close
New speaker
Add speaker
close
Edit speaker
Save changes
close
Share Transcript