{"id":5260,"date":"2016-01-07T03:22:02","date_gmt":"2016-01-07T08:22:02","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=5260"},"modified":"2019-11-15T15:24:18","modified_gmt":"2019-11-15T11:24:18","slug":"ces-security-want","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/ces-security-want\/5260\/","title":{"rendered":"5 pieces of tech from CES we hope stay secure"},"content":{"rendered":"<p>So the whirlwind that is CES is in full swing. Companies of all sizes are introducing some\u00a0<a href=\"https:\/\/youtu.be\/sgkgtmgljyk\" target=\"_blank\" rel=\"noopener nofollow\">pretty sweet products<\/a>\u00a0that will make our lives more connected and easier and our wallets a tad lighter \u2014 that was our New Year\u2019s resolution, to get lighter, right?<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Why not set a <a href=\"https:\/\/twitter.com\/hashtag\/NewYearsResolution?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#NewYearsResolution<\/a> that is important, not cosmetic. Fix your <a href=\"https:\/\/twitter.com\/hashtag\/security?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#security<\/a> habits <a href=\"https:\/\/t.co\/JCo4S4EEPf\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/JCo4S4EEPf<\/a> <a href=\"https:\/\/t.co\/AaxA9BoSOx\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/AaxA9BoSOx<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/684039201688567808?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">January 4, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>In following along with the action, I could not help but notice that there were some really cool products, but ones that could really be hurt should they fall prey to a cybercriminal. Stop shaking your head \u2014 I work at a cybersecurity company; we read up about too many attacks, even this year, despite the fact it is less than a month old.<\/p>\n<p>Plus, in looking at the still-emerging Internet of Things, we are too often reminded that security often falls to the bottom of the totem pole or priority list as these companies make a device that connects you to the Internet in a way that you never knew you needed. Facebook\u2019s motivational posters may sum this up best: \u201cDone is better than PERFECT.\u201d<\/p>\n<p>With that in mind, I am not anticipating that the full lineup of IoT products unveiled at CES will be without lapses in security. Similarly, I do not anticipate that 100% of the products will remain hack free. We also asked our Twitter community what they thought. Spoiler alert: they agreed with my take.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">With <a href=\"https:\/\/twitter.com\/hashtag\/CES2016?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#CES2016<\/a> upon us and the <a href=\"https:\/\/twitter.com\/hashtag\/IoT?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#IoT<\/a> growing, do you think that security will be a priority for companies?<\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/684453521324924928?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">January 5, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>While discussing some of the products with my colleague Alex, we noted that there would be a number of products that we would hate to see hacked for any given reason. We had too many to compile into a single post, so the list was whittled down to five that we really hoped would be products that took security seriously.<\/p>\n<h3>Smarter Showers<\/h3>\n<p>We all know that water is a valuable asset that folks in many countries \u2014 especially the US \u2014 take entirely for granted. Lord knows how much water we waste each time we hop in to get cleaned up waiting for water temperature to get right, lather up, etc. Enter the\u00a0<a href=\"http:\/\/mashable.com\/2016\/01\/05\/hydrao-smart-shower-head-ces\/\" target=\"_blank\" rel=\"noopener nofollow\">Hydrao Smart Shower<\/a>. For $99, you can get a showerhead that helps track how much water you have used via an app and will also alert you via LED lights to how much water you have used as you get clean. The company also offers some really cool tools\u00a0<a href=\"http:\/\/www.hydrao.fr\/en\/accueil-en\/ces\/\" target=\"_blank\" rel=\"noopener nofollow\">on their site<\/a>.<\/p>\n<p>In all honesty, the shower is a private place. No one wants to be intruded upon. Given the app component of the shower head, one could tune into your showering patterns and discern when you are home and when you are not. Should you use the app to track your entire family, the frequency, or lack thereof, of showering could be used to shame or ridicule people of all ages, and no one likes a bully.<\/p>\n<h3>Look up in the sky<\/h3>\n<p>It\u2019s a bird; it\u2019s a plane! Actually no, it\u2019s a\u00a0<a href=\"http:\/\/www.theverge.com\/2016\/1\/4\/10708140\/dji-ford-rescue-drone-competition-united-nations-un-ces-2016\" target=\"_blank\" rel=\"noopener nofollow\">rescue drone<\/a>! The team at DJI teamed up with Ford to roll out a rescue drone that can be launched from a moving car. The technology could have many applications in helping rescue people trapped in floods, fires, or other types of natural disasters. It could also be used in high-speed chases to track criminals or find a missing child.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Ford and DJI team up to build a rescue drone that launches from a moving car <a href=\"https:\/\/twitter.com\/hashtag\/CES2016?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#CES2016<\/a> <a href=\"https:\/\/t.co\/WjjNNSfeyc\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/WjjNNSfeyc<\/a> <a href=\"https:\/\/t.co\/nKAgA4qIdE\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/nKAgA4qIdE<\/a><\/p>\n<p>\u2014 The Verge (@verge) <a href=\"https:\/\/twitter.com\/verge\/status\/684401222837665792?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">January 5, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>While this innovation has a lot of implications for good, we all know that the bad guys always look for a way to exploit it. For example, should this tech fall victim to a hack, the footage (much like that of\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/infected-body-camera\/10845\/\" target=\"_blank\" rel=\"noopener nofollow\">body cameras<\/a>) could be used to hunt the hunters, evade authorities, or even increase the level of illicit spying.<\/p>\n<h3>Future Computer Programmers<\/h3>\n<p>Kids are like sponges. They will absorb any type of education that you can give them at a young age. As a parent, I know this factor all too well. Over the past few years, I have seen a number of tools, games, and toys that would help teach computer programming to kids to help ensure that they get the right foot forward into a fulfilling career.<\/p>\n<p>\u201cThe future coders of 2035 may only be preschoolers today, but their journey to tech hubs around the globe begins now,\u201d reads the text of a promotional image for the toy. \u201cWhen playing with the Think &amp; Learn Code-A-Pillar from Fisher-Price, kids will be exposed to the foundational skills of coding, like thinking skills, problem solving, and sequencing.\u201d<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">At <a href=\"https:\/\/twitter.com\/hashtag\/CES2016?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#CES2016<\/a> <a href=\"https:\/\/twitter.com\/HeySamantha?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@HeySamantha<\/a> got hands-on w new <a href=\"https:\/\/twitter.com\/hashtag\/Codeapillar?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Codeapillar<\/a> robot to teach kids about code <a href=\"https:\/\/t.co\/Aqt8jitsL1\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/Aqt8jitsL1<\/a> <a href=\"https:\/\/t.co\/imYpvtjyEj\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/imYpvtjyEj<\/a><\/p>\n<p>\u2014 FutureShift (@futureshift) <a href=\"https:\/\/twitter.com\/futureshift\/status\/684810880052293632?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">January 6, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>The latest installment comes from the fine folks at Fisher-Price. Their\u00a0<a href=\"http:\/\/www.entrepreneur.com\/article\/254685\" target=\"_blank\" rel=\"noopener nofollow\">Think and Learn Code-A-Pillar<\/a>, targeted at children between 3 and 8-years old, allows kids to connect segments to create programmed movements. The companion apps work with Android and IOS apps. The company will announce more details at a toy show next month.<\/p>\n<p>While I am already thinking about if my kids would dig this (or me), at the end of the day it is a toy that will connect to the Internet and undoubtedly will have some type of user-based account that asks for all kinds of data. The account will likely contain a treasure trove of data that will allow thieves to steal kids\u2019 identities and fly under the radar given the ages of the kids. Think it can\u2019t happen? I present to you\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/hello-kitty-hacked\/10916\/\" target=\"_blank\" rel=\"noopener nofollow\">Hello Kitty<\/a>\u00a0and\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/vtech-toys-hacked\/10697\/\" target=\"_blank\" rel=\"noopener nofollow\">VTech<\/a>.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/bir449_wK3A?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<h3>Protect this House<\/h3>\n<p>During the show, Under Armour unveiled their line of\u00a0<a href=\"http:\/\/www.forbes.com\/sites\/kurtbadenhausen\/2016\/01\/05\/under-armour-launches-portfolio-of-digital-fitness-products-at-ces\/\" target=\"_blank\" rel=\"noopener nofollow\">connected fitness products<\/a>. Now, don\u2019t let me rain on your workout parade \u2014 but it\u2019s been shown too many times that there are security flaws in these fitness products. The team at Securelist has covered this topic\u00a0<a href=\"https:\/\/securelist.com\/analysis\/publications\/69412\/iot-research-smartbands\/\" target=\"_blank\" rel=\"noopener\">here<\/a>\u00a0and\u00a0<a href=\"https:\/\/securelist.com\/blog\/research\/69369\/how-i-hacked-my-smart-bracelet\/\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p>Now I may play a doctor from time to time on TV, but you should seriously not follow my fitness advice. If you are going to use smart devices to track your fitness, just make sure that you are not oversharing your data. While your Facebook friends may silently curse you or unfriend you, hackers may be collecting your data to sell it to the highest bidder.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Your fitness is their business. Nothing personal \u2013  <a href=\"https:\/\/t.co\/82w3NuTWxl\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/82w3NuTWxl<\/a> via <a href=\"https:\/\/twitter.com\/kaspersky?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@kaspersky<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/security?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#security<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/527931777881751552?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">October 30, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<h3>May the Force be with You<\/h3>\n<p>Star Wars has been out for a while now, so I am not afraid to dish out any spoilers on you. If you have turned on a TV, surfed the Web, or opened up a piece of junk mail, you have surely seen BB-8, or the toy from Sphero that allows you to control the droid with your smartphone. But then again, smartphones are soooo Phantom Menace and Sphero gave everyone at CES a collective nerdgasm as you will be able to control BB-8 with\u2026. Wait for it\u2026 wait for it\u2026<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5262\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2016\/01\/05113039\/vpnswcovvu41ewx6wpdn.gif\" alt=\"vpnswcovvu41ewx6wpdn\" width=\"800\" height=\"450\"><\/p>\n<p><a href=\"http:\/\/gizmodo.com\/a-new-wearable-lets-you-control-spheros-bb-8-using-the-1750989688?utm_campaign=socialflow_gizmodo_facebook&amp;utm_source=gizmodo_facebook&amp;utm_medium=socialflow\" target=\"_blank\" rel=\"noopener nofollow\">WITH THE FORCE!<\/a><\/p>\n<p>How cool is that? Sure you will have to wear a device on your wrist, but hell, it is the Force.<\/p>\n<p>Now you are probably wondering what the hell a hacker could do with this. For starters, the whitehats in the\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/?s=bionicman&amp;submit=search\" target=\"_blank\" rel=\"noopener nofollow\">biohacking space<\/a>\u00a0could probably find a way to use a chip to control the droid losing the item on your wrist. However, those succumbed to the Dark Side of the Force could look to ruin your fun.<\/p>\n<p>As with any app, there is the opportunity for a devilish person to take control of the device and not let the primary user play with their toy. You may think you want BB-8 to go and mess with your cat, only to have it roll down the stairs \u2014 leaving you out not only a good time, but also out some coin on your purchase.<\/p>\n<p>So there you have it, the five products from CES we hope have added security. Here\u2019s to hoping we don\u2019t have to report back that the bad guys won the day.<\/p>\n<p>What were your favorite products?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>So the whirlwind that is CES is in full swing. Companies of all sizes are introducing some\u00a0pretty sweet products\u00a0that will make our lives more connected and easier and our wallets<\/p>\n","protected":false},"author":636,"featured_media":5261,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,1486],"tags":[1111,1112,1113,1114,1115,1116,1117,1118],"class_list":{"0":"post-5260","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-bb-8","10":"tag-ces","11":"tag-ces-2016","12":"tag-fisher-price","13":"tag-future-of-coding","14":"tag-smart-shower","15":"tag-the-force-awakens","16":"tag-think-and-learn-a-pillar"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/ces-security-want\/5260\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/ces-security-want\/6513\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/ces-security-want\/6514\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/ces-security-want\/7460\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/ces-security-want\/7208\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/ces-security-want\/10457\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ces-security-want\/11006\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/ces-security-want\/6705\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/ces-security-want\/10043\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/ces-security-want\/10457\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ces-security-want\/11006\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ces-security-want\/11006\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/bb-8\/","name":"BB-8"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5260","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/636"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=5260"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5260\/revisions"}],"predecessor-version":[{"id":14899,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5260\/revisions\/14899"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/5261"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=5260"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=5260"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=5260"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}