Kaspersky blasts Amazon's indoor drone as a 'major security risk'

The IoT device could be used by hackers to locate valuables and map out routes through a home, researchers warn

Amazon's new camera security drone, 'Always home'

Amazon's newly launched smart home security drone presents a "whole new wave of cyber security risks", according to Kaspersky.

Researchers at the security firm have warned that if the technology is compromised it could give hackers a map of a user's home and access to sensitive data, including bank details.

The flying camera drone, 'Always Home', is the latest product from Amazon's Ring division. It's a black device that sits in a white docking station that launches when something or someone sets off any home sensors.

The drone is controlled via a smartphone and is capable of capturing images which are then sent to the controlling device.

Kaspersky researchers claim it's this functionality that has the potential to be used against the consumers who buy it.

"The development of unmanned security drones presents a whole new wave of cyber security risks," said David Emm, principal security researcher at Kaspersky. "If hacked, this smart technology could provide cybercriminals with a complete map of an individual's home – including the location of valuable items and possible access points to the house.

"The linked smartphone is also vulnerable to attack. If the connection between the drone and phone is compromised, then hackers can gain access to the individual's sensitive data, including contact and banking details."

Emm suggests that anyone considering buying the miniature security drone, or any smart device for that matter, should take steps to improve security, such as changing any default passwords, using WPA2 encryption on home routers and enabling automatic updates.

Related Resource

The state of data protection and cloud

The challenge of providing effective enterprise data protection

Download now

There have been a number of reports of Amazon IoT products being hacked, or at least found to have vulnerabilities, over the past year. In November 2019, researchers found an exploit in the Ring doorbell that allowed hackers to intercept Wi-Fi passwords in clear text.

Early in 2020, it was revealed that some hackers could gain access to user voice history via an Alexa subdomain attack. This was an exploit of a cross-origin resource sharing misconfiguration.

Featured Resources

Unleashing the power of AI initiatives with the right infrastructure

What key infrastructure requirements are needed to implement AI effectively?

Download now

Achieve today. Plan tomorrow. Making the hybrid multi-cloud journey

A Veritas webinar on implementing a hybrid multi-cloud strategy

Download now

A buyer’s guide for cloud-based phone solutions

Finding the right phone system for your modern business

Download now

The workers' experience report

How technology can spark motivation, enhance productivity and strengthen security

Download now

Recommended

Fears over cyber crime tool that can build phishing pages in real-time
phishing

Fears over cyber crime tool that can build phishing pages in real-time

28 Jan 2021
What is e-safety?
e safety

What is e-safety?

27 Jan 2021
Your essential guide to internet security
Security

Your essential guide to internet security

27 Jan 2021
Mimecast links breach to SolarWinds hackers
Security

Mimecast links breach to SolarWinds hackers

27 Jan 2021

Most Popular

How to move Windows 10 from your old hard drive to SSD
operating systems

How to move Windows 10 from your old hard drive to SSD

21 Jan 2021
Hackers are actively exploiting three Apple iOS flaws
exploits

Hackers are actively exploiting three Apple iOS flaws

27 Jan 2021
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

26 Jan 2021