{"id":23707,"date":"2025-01-16T17:30:16","date_gmt":"2025-01-16T13:30:16","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=23707"},"modified":"2025-01-16T17:30:16","modified_gmt":"2025-01-16T13:30:16","slug":"ces-2025-cybersecurity","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/ces-2025-cybersecurity\/23707\/","title":{"rendered":"How safe are the top innovations at CES 2025?"},"content":{"rendered":"<p>One of the world\u2019s premier tech events traditionally takes place every year in Las Vegas in early January. Sure, the Consumer Electronics Show (CES) pays attention to cybersecurity, but by no means is it top of the agenda. Looking for a giant <a href=\"https:\/\/www.pcworld.com\/article\/2570762\/the-10-best-monitors-of-ces-2025-face-melting-displays-of-the-future.html\" target=\"_blank\" rel=\"nofollow noopener\">monitor<\/a> or <a href=\"https:\/\/www.techradar.com\/home\/smart-home\/samsung-expands-its-ai-home-technology-to-new-appliances-and-theres-one-im-beelining-for-at-ces\" target=\"_blank\" rel=\"nofollow noopener\">AI washing machine<\/a>? You\u2019re in luck! Smart home <a href=\"https:\/\/www.kaspersky.com\/blog\/hacking-things\/27431\/\" target=\"_blank\" rel=\"noopener nofollow\">protection against hackers<\/a>? Might have to shop around a bit\u2026<\/p>\n<p>We\u2019ve picked out the top trending announcements at CES\u00a02025, with a focus on what new cyberthreats to expect as the latest innovations hit the shelves.<\/p>\n<h2>NVIDIA Project DIGITS: your own mini supercomputer for running AI locally<\/h2>\n<p>NVIDIA founder Jensen Huang unveiled the company\u2019s Mac-Mini-sized supercomputer to CES visitors. Powered by the GB10 Grace Blackwell \u201csuperchip\u201d with a minimum 128\u00a0GB of memory, the device is capable of running large language models (LLMs) with 200 billion parameters. Connect two such computers, and you can run even larger models with up to 400\u00a0billion parameters! However, the US$3000 price tag will limit the buyer audience.<\/p>\n<p><strong>Cybersecurity aspect:<\/strong> running LLMs <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-use-ai-locally-and-securely\/50576\/\" target=\"_blank\" rel=\"noopener nofollow\">locally<\/a> stops confidential information from leaking to OpenAI, Google Cloud, and other such services. Until now, this wasn\u2019t very practical: on offer were either greatly simplified models that struggled to run on gaming computers, or solutions deployed on powerful servers in private clouds. \u201cNVIDIA Project DIGITS\u201d now made it easier for both small companies and wealthy hobbyists to run powerful local LLMs.<\/p>\n<div id=\"attachment_52880\" style=\"width: 1930px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/01\/16171441\/ces-2025-cybersecurity-01.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-52880\" class=\"size-full wp-image-52880\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/01\/16171441\/ces-2025-cybersecurity-01.jpg\" alt=\"The GB10 Grace Blackwell superchip, 128 GB of RAM, and 4 TB of SSD storage make this NVIDIA offer a decent platform for a local neural network. \" width=\"1920\" height=\"1080\"><\/a><p id=\"caption-attachment-52880\" class=\"wp-caption-text\">The GB10 Grace Blackwell superchip, 128\u00a0GB of RAM, and 4\u00a0TB of SSD storage make this NVIDIA offer a decent platform for a local neural network. <a href=\"https:\/\/www.nvidia.com\/en-us\/project-digits\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<h2>Roborock Saros Z70: a \u201chandy\u201d vacuum cleaner<\/h2>\n<p>The inability of robot vacuum cleaners to cope with stairs and other obstacles, including things lying around, greatly limits their usefulness. <a href=\"https:\/\/mashable.com\/article\/roborock-saros-z70-hands-on-ces-2025\" target=\"_blank\" rel=\"nofollow noopener\">Roborock\u2019s new model solves the latter issue with an extensible arm that picks up small and light objects from the floor. <\/a><\/p>\n<p><strong>Cybersecurity aspect:<\/strong> the Saros Z70\u2019s object-rearranging ability is very limited, and Roborock has not been involved in any major cybersecurity scandals. So we\u2019re unlikely to see any game-changing risks compared to existing vacuum cleaners. But later models or competitors\u2019 products can theoretically be used in cyberphysical attacks such as burglary. For instance, researchers recently showed how to <a href=\"https:\/\/www.kaspersky.com\/blog\/ecovacs-robot-vacuums-hacked-in-real-life\/52837\/\" target=\"_blank\" rel=\"noopener nofollow\">hack<\/a> Ecovacs robot vacuums.<\/p>\n<p>But the Saros Z70 is notable for more than just its mechanical hand. Another of its officially announced features is video surveillance. The vendor claims that camera footage never leaves the device, but we\u2019ll believe that when we see it. After all, you\u2019ll probably at least need a separate device to view the footage. The StarSight 2.0 system, due with a later software update, will let you train the robot to recognize specific household objects (for example, favorite toys) so that it can show where it last saw them on a map of your home. As to whether this handy feature works entirely on the device \u2014 or data about things in your home gets fed to the cloud \u2014 press releases are maintaining a tactful silence.<\/p>\n<div id=\"attachment_52879\" style=\"width: 1950px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/01\/16171507\/ces-2025-cybersecurity-02.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-52879\" class=\"size-full wp-image-52879\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/01\/16171507\/ces-2025-cybersecurity-02.jpg\" alt=\"The Roborock Saros Z70 can lift and carry objects weighing up to 300 grams. \" width=\"1940\" height=\"1056\"><\/a><p id=\"caption-attachment-52879\" class=\"wp-caption-text\">The Roborock Saros Z70 can lift and carry objects weighing up to 300 grams. <a href=\"https:\/\/us.roborock.com\/pages\/roborock-saros-z70\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<h2>Bosch Revol: preying on parental fear<\/h2>\n<p>How did a baby rocker manage to take home the \u201cLeast private\u201d <a href=\"https:\/\/www.ifixit.com\/News\/107510\/worst-in-show-2025-not-all-innovation-is-good-innovation\" target=\"_blank\" rel=\"nofollow noopener\">mock award<\/a> for gadgets at CES\u00a02025, as judged by Electronic Frontier Foundation and iFixIt? The <a href=\"https:\/\/www.engadget.com\/home\/smart-home\/boschs-ai-enabled-bassinet-tracks-everything-youd-ever-want-to-know-about-your-babys-sleep-025258549.html\" target=\"_blank\" rel=\"nofollow noopener\">Bosch Revol Smart Crib<\/a> not only automatically rocks the crib, but continuously collects video and audio data, while simultaneously scanning the baby\u2019s pulse and breathing rate using millimeter-wave radar. It also monitors temperature, humidity and fine-particle pollution levels. The camera is equipped with object recognition to detect toys, blankets and other potentially dangerous objects near the infant\u2019s face. All data is instantly streamed to a parental smartphone and to the cloud, where it remains.<\/p>\n<p><strong>Cybersecurity aspect:<\/strong> other vendors\u2019 video baby monitors have been dogged by <a href=\"https:\/\/www.npr.org\/sections\/thetwo-way\/2018\/06\/05\/617196788\/s-c-mom-says-baby-monitor-was-hacked-experts-say-many-devices-are-vulnerable\" target=\"_blank\" rel=\"nofollow noopener\">scandals<\/a>, and <a href=\"https:\/\/www.buzzfeed.com\/craigsilverman\/creeps-hack-baby-monitors-and-say-terrifying-thing?utm_term=.bp1nj3RzmJ#.rn5DnN71eR\" target=\"_blank\" rel=\"nofollow noopener\">hacked<\/a> to conduct nasty pranks and spy on parents. In the case of the Revol, not only video, but medical data could end up in cybercriminal hands. When it comes to child and health-related tech, a cloud-free setup as part of a well-protected smart home is the way to go.<\/p>\n<h2>TP-Link Tapo DL130: in the same vein?<\/h2>\n<p>Among the many smart locks unveiled at CES 2025, it was <a href=\"https:\/\/9to5toys.com\/2025\/01\/06\/new-tp-link-ai-palmkey-lock-hand-vein\/\" target=\"_blank\" rel=\"nofollow noopener\">TP-Link\u2019s model<\/a> that stood out for a feature that\u2019s still quite rare\u00a0\u2014 biometrics based not only on face\/fingerprint recognition, but also on palm veins matching. Simply wave your hand in front of the sensor, and the system will identify you as the owner with high accuracy. Unlike more common biometric factors, this method doesn\u2019t depend on lighting conditions, and works well even with wet and dirty hands. Plus, it\u2019s more difficult to fake.<\/p>\n<p><strong>Cybersecurity aspect:<\/strong> smart locks can be integrated into your home network and interact with your smart home (such as Alexa or Google Home), which creates a wide cyberattack surface. Given the <a href=\"https:\/\/thehackernews.com\/2024\/05\/tp-link-gaming-router-vulnerability.html\" target=\"_blank\" rel=\"nofollow noopener\">numerous critical vulnerabilities<\/a> in other TP-Link <a href=\"https:\/\/arstechnica.com\/information-technology\/2024\/11\/microsoft-warns-of-8000-strong-botnet-used-in-password-spraying-attacks\/\" target=\"_blank\" rel=\"nofollow noopener\">equipment<\/a>, there\u2019s a risk that flaws in smart locks will allow attackers to open them in unconventional ways.<\/p>\n<div id=\"attachment_52878\" style=\"width: 1821px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/01\/16171544\/ces-2025-cybersecurity-03.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-52878\" class=\"size-full wp-image-52878\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2025\/01\/16171544\/ces-2025-cybersecurity-03.jpg\" alt=\"Security researchers are sure to put TP-Link's smart lock under the microscope once it goes on sale. \" width=\"1811\" height=\"1027\"><\/a><p id=\"caption-attachment-52878\" class=\"wp-caption-text\">Security researchers are sure to put TP-Link\u2019s smart lock under the microscope once it goes on sale. <a href=\"https:\/\/www.tp-link.com\/us\/home-networking\/cloud-camera\/tapo-dl130\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<h2>Google Home + Matter: a cloud-free <span style=\"text-decoration: line-through\">sky<\/span> home<\/h2>\n<p>A <a href=\"https:\/\/www.theverge.com\/2025\/1\/8\/24338969\/google-home-hubs-local-control-matter\" target=\"_blank\" rel=\"nofollow noopener\">major update<\/a> to Google\u2019s smart home hubs means they can now control curtains, sockets, light bulbs and other devices via the Matter protocol without connecting to a cloud server. At the heart of your smart home can be a Google Nest \u2014 an Android\u00a014 smart TV or even a Chromecast device. Tell Google Assistant to \u201cswitch on the bedroom light\u201d, and the command will be carried out even without an internet connection, and with minimal delay.<\/p>\n<p>If a staunch advocate of a cloud-based future like Google has implemented such offline scenarios, the demand for such functionality must be huge.<\/p>\n<p><strong>Cybersecurity aspect:<\/strong> <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-secure-smart-home\/47472\/\" target=\"_blank\" rel=\"noopener nofollow\">local control of your smart home<\/a> reduces the risk of compromise and improves privacy\u00a0\u2014 less data about what goes on in your home will leak to equipment vendors.<\/p>\n<h2>Halliday Glasses: improve your <em>AI-sight<\/em><\/h2>\n<p>We chose <a href=\"https:\/\/www.theverge.com\/2025\/1\/5\/24334030\/halliday-smart-glasses-ai-tiny-display-frame-availability-price-ces\" target=\"_blank\" rel=\"nofollow noopener\">Halliday AR glasses<\/a> for the innovative image projection system that makes them lighter and more compact \u2014 though our takeaways also apply to <a href=\"https:\/\/www.theverge.com\/2025\/1\/10\/24340208\/ces-2025-smart-glasses-rokid-halliday-xreal-vuzix-nuance-audio\" target=\"_blank\" rel=\"nofollow noopener\">dozens of other smart glasses<\/a> presented at CES\u00a02025. While some models address a simple and specific issue \u2014 such as combining glasses with a hearing aid or serving as a near-eye display for computer users on board a plane \u2014 quite a few of them come equipped with an AI assistant, camera, ChatGPT integration, and other features that potentially can be used to spy on you. They\u2019re used for live translation, teleprompting and other productivity-boosting tasks.<\/p>\n<p><strong>Cybersecurity aspect:<\/strong> all AI features involve shifting large amounts of data to the makers\u2019 servers for processing, so local AI in glasses is still a long way off. But unlike with computers and smartphones, the voices, photos and videos of all those around you will be included in the information flow generated by the glasses. From an ethical or legal standpoint, wearers of such glasses may have to continuously ask permission from everyone around to record them. And those who don\u2019t want to pose for Sam Altman should look out for wearers of smart glasses among their peers.<\/p>\n<h2>Sony Honda AFEELA: I feel it\u2019s going to be driving by subscription<\/h2>\n<p>This luxury <a href=\"https:\/\/www.theverge.com\/2025\/1\/6\/24336375\/sony-honda-afeela-ev-preorder-price-ces\" target=\"_blank\" rel=\"nofollow noopener\">electric car from two Japanese giants<\/a> is available to preorder\u00a0\u2014 but only to California residents and with rollout scheduled for 2026 or later. Nevertheless, the Japanese vision could become the envy even of Google: the price of the vehicle includes a \u201ccomplimentary three-year subscription\u201d to a variety of in-car features, including <a href=\"https:\/\/caradas.com\/levels-of-autonomous-driving-all-levels\/\" target=\"_blank\" rel=\"nofollow noopener\">Level 2+ ADAS<\/a> driver-assist and an AI-powered personal assistant, and a choice of interactive car design and entertainment features such as augmented reality and \u201cvirtual worlds\u201d.<\/p>\n<p>At the CES 2025 demonstration, the car was summoned onstage by the voice command \u201cCome on out, Afeela\u201d\u00a0\u2014 but it remains unclear whether this handy feature will be available to drivers.<\/p>\n<p><strong>Cybersecurity aspect:<\/strong> we\u2019ve spotlighted the <a href=\"https:\/\/www.kaspersky.com\/blog\/dont-hack-your-car\/22090\/\" target=\"_blank\" rel=\"noopener nofollow\">risks and vulnerabilities of \u201cconnected\u201d cars<\/a> <a href=\"https:\/\/www.kaspersky.com\/blog\/automotive-apps-security\/44425\/\" target=\"_blank\" rel=\"noopener nofollow\">many times<\/a>. Whether manufacturers will be able to keep the security bar high, not only for vehicles, but also for telematics systems (especially critical if smart driving becomes subscription-based), is a big question for the future. Those who don\u2019t like the idea of their car <a href=\"https:\/\/teslamotorsclub.com\/tmc\/threads\/software-updates-stuck-car-not-drivable-self-resolved-after-1-hour.303436\/\" target=\"_blank\" rel=\"nofollow noopener\">suddenly turning into an iron pumpkin<\/a> pending a software update or after a cyberattack are advised to refrain from splashing out\u2026 at least for another decade or so.<\/p>\n<h2>BenjiLock: a biometric padlock<\/h2>\n<p>Now you can lock up your bike (or barn or whatever) without memorizing a code or carrying around a key. As the name suggests, the <a href=\"https:\/\/benjilock.com\/\" target=\"_blank\" rel=\"nofollow noopener\">BenjiLock Outdoor Fingerprint Padlock<\/a> is a padlock that stores and recognizes fingerprints \u2014 up to ten of them. No smartphone or Wi-Fi required, all the magic happens inside the lock itself. The device is resistant to both moisture and dust, and (according to the manufacturer) works on one charge for up to a year.<\/p>\n<p><strong>Cybersecurity aspect:<\/strong> only real-world tests can prove resistance to <a href=\"https:\/\/www.kaspersky.com\/blog\/3-reasons-not-to-use-smart-locks\/47866\/\" target=\"_blank\" rel=\"noopener nofollow\">old-school lock picking<\/a> and <a href=\"https:\/\/www.kaspersky.com\/blog\/fingerprint-brute-force-android\/48303\/\" target=\"_blank\" rel=\"noopener nofollow\">inexpensive fingerprint faking<\/a>. Smart locks are often vulnerable to both.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-generic\">\n","protected":false},"excerpt":{"rendered":"<p>Hundreds of new gadgets and smart appliances are traditionally unveiled every January at the Consumer Electronics Show in Vegas. How will they affect our cybersecurity?<\/p>\n","protected":false},"author":2722,"featured_media":23710,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[1481,621,1112,2802,628,765,1121,43,981,630,683,321],"class_list":{"0":"post-23707","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-ai","9":"tag-cars","10":"tag-ces","11":"tag-google-home","12":"tag-internet-of-things","13":"tag-iot","14":"tag-locks","15":"tag-privacy","16":"tag-robots","17":"tag-smart-home","18":"tag-spying","19":"tag-technology"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/ces-2025-cybersecurity\/23707\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/ces-2025-cybersecurity\/28448\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/ces-2025-cybersecurity\/12226\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/ces-2025-cybersecurity\/28583\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/ces-2025-cybersecurity\/27905\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/ces-2025-cybersecurity\/30702\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/ces-2025-cybersecurity\/29393\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/ces-2025-cybersecurity\/38898\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/ces-2025-cybersecurity\/13097\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ces-2025-cybersecurity\/52874\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/ces-2025-cybersecurity\/22516\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/ces-2025-cybersecurity\/23283\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/ces-2025-cybersecurity\/31890\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/ces-2025-cybersecurity\/28708\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ces-2025-cybersecurity\/34536\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ces-2025-cybersecurity\/34163\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/ces\/","name":"CES"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/23707","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2722"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=23707"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/23707\/revisions"}],"predecessor-version":[{"id":23711,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/23707\/revisions\/23711"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/23710"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=23707"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=23707"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=23707"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}