Skip to Content
man holding tablet
© Andrew Angelov | Dreamstime.com
Security & privacy

These devices are MOST at risk of being hacked

Your connected security cameras give you peace of mind. They serve as both a deterrent to criminals and can provide evidence for the police in case you are a burglary victim.

We have some bad news. Crooks can easily jam your cameras with a $15 gadget, rendering them blind. Tap or click here for how the trick works and what you can do to prevent it.

Now here’s some worse news. Blocking what your cameras see is one thing, but hackers can also use them to enter your network. And it’s not only cameras. We’ll show you how to secure your most vulnerable devices.

Here’s the backstory

Cybersecurity researchers at Forescout identified connected devices at the most risk of being hacked. The results included IoT (Internet of Things) devices commonly found in our homes. Any device connected to a network for sending and receiving data falls under IoT.

Criminals who hack these devices can cause lots of problems:

  • They can implant malware or ransomware.
  • They can gain sensitive information from the data the devices are transferring.
  • They can use the devices as a gateway to access your network.
  • Once in your network, they can access your other devices, such as your computer.

RELATED: 3 ways to find out if your smart TV was hacked (and how to protect it)

Here are the top five most vulnerable IoT devices:

  • IP camera: This includes any surveillance camera connected to a network.
  • VoIP: Voice over internet protocol (VoIP) is a type of phone system that uses an internet connection to make and receive calls.
  • Video conferencing: This became wildly popular during the onset of the pandemic and many people and businesses still use video conferencing every day.
  • ATMs: Researchers found many ATMs are on the same network as other IoT devices, such as security cameras. Hackers can use those devices to gain access to ATMs.
  • Printers: When focusing on securing your computer, router, phone and other connected devices, don’t forget that your printer is another vulnerability. Tap or click here for five steps to keep hackers out of your printer.

How to stay safe

There are a few simple steps you can take to protect your connected devices and reduce the risk of being hacked:

Keep reading

Do this or anyone can see what your security camera sees

Security alert: Devices most commonly used to spy on spouses and partners [List]

Stop robocalls once and for all

Robocalls are not only annoying, but they scam Americans out of millions every year. Learn Kim's tricks for stopping them for good in this handy guide.

Get the eBook