Home security systems put people at risk, according to a recent F.B.I. announcement. The U.S. Federal Bureau of Investigation mentioned that attackers hack these systems and set them up to place fake emergency calls. The method is called “swatting.”
What is swatting and how does it work with smart devices?
According to the F.B.I., the devices that have cameras and also voice skills need very strong unique passwords and a multi-factor authentication. So, F.B.I. advised users to change their passwords, in order to protect from “swatting” attacks.
According to the security experts, the swatting is possible by using stolen credentials of the victims.
Swatting describes a hoax call, made to emergency services. It basically tries to make S.W.A.T. teams react as if there was a threat to human life. The method is usually a form as harassment or a prank, although it is a serious crime.
According to the investigation, offenders use victims’ home security smart devices, including the video and audio ones, in order to execute the attacks.
Before the attack, hackers steal email passwords. Thus, they are able to log into the smart security devices and hijack their features. Then, they call emergency services and report crimes in the victims’ house.
Some of the threat actors also choose to live stream such events and share them on the online community platforms.
So, the F.B.I experts came with some protection measures users have to take in order to avoid such attacks:
Still, the F.B.I. is investigating further in order to discover any other breaches and also encourages users to immediately make a police report if they feel they have become victims.
Allow us to introduce you to a list of the best ROM sites for downloading…
If you are looking for the best safe browser for kids, you have come to…
If you want to enhance the performance of your printer by way of the HP…
If you wish to install the contents on any Windows PC to another PC, you…
If you are looking for server-based tools for database management using SQL, you can take…
If you want to ascertain the most vulnerable files, areas, and sectors in your data,…