Kaspersky blasts Amazon's indoor drone as a 'major security risk'

The IoT device could be used by hackers to locate valuables and map out routes through a home, researchers warn

Amazon's new camera security drone, 'Always home'

Amazon's newly launched smart home security drone presents a "whole new wave of cyber security risks", according to Kaspersky.

Researchers at the security firm have warned that if the technology is compromised it could give hackers a map of a user's home and access to sensitive data, including bank details.

The flying camera drone, 'Always Home', is the latest product from Amazon's Ring division. It's a black device that sits in a white docking station that launches when something or someone sets off any home sensors.

The drone is controlled via a smartphone and is capable of capturing images which are then sent to the controlling device.

Kaspersky researchers claim it's this functionality that has the potential to be used against the consumers who buy it.

"The development of unmanned security drones presents a whole new wave of cyber security risks," said David Emm, principal security researcher at Kaspersky. "If hacked, this smart technology could provide cybercriminals with a complete map of an individual's home – including the location of valuable items and possible access points to the house.

"The linked smartphone is also vulnerable to attack. If the connection between the drone and phone is compromised, then hackers can gain access to the individual's sensitive data, including contact and banking details."

Emm suggests that anyone considering buying the miniature security drone, or any smart device for that matter, should take steps to improve security, such as changing any default passwords, using WPA2 encryption on home routers and enabling automatic updates.

Related Resource

The state of data protection and cloud

The challenge of providing effective enterprise data protection

Download now

There have been a number of reports of Amazon IoT products being hacked, or at least found to have vulnerabilities, over the past year. In November 2019, researchers found an exploit in the Ring doorbell that allowed hackers to intercept Wi-Fi passwords in clear text.

Early in 2020, it was revealed that some hackers could gain access to user voice history via an Alexa subdomain attack. This was an exploit of a cross-origin resource sharing misconfiguration.

Featured Resources

Choosing a collaboration platform

Eight questions every IT leader should ask

Download now

Performance benchmark: PostgreSQL/ MongoDB

Helping developers choose a database

Download now

Customer service vs. customer experience

Three-step guide to modern customer experience

Download now

Taking a proactive approach to cyber security

A complete guide to penetration testing

Download now

Recommended

Botnet targets vulnerable Microsoft Exchange servers
botnets

Botnet targets vulnerable Microsoft Exchange servers

23 Apr 2021
A guide to cyber security certification and training
Careers & training

A guide to cyber security certification and training

22 Apr 2021
What is hacktivism?
hacking

What is hacktivism?

22 Apr 2021
Geico data breach leads to stolen driver’s license numbers
data breaches

Geico data breach leads to stolen driver’s license numbers

21 Apr 2021

Most Popular

REvil threatens to release Apple’s hardware schematics
ransomware

REvil threatens to release Apple’s hardware schematics

21 Apr 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

8 Apr 2021
Samsung Galaxy S21 Ultra review: Ultra in every sense of the word
Mobile Phones

Samsung Galaxy S21 Ultra review: Ultra in every sense of the word

22 Apr 2021