{"id":31698,"date":"2019-06-26T03:36:00","date_gmt":"2019-06-26T07:36:00","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=31698"},"modified":"2019-06-26T03:36:00","modified_gmt":"2019-06-26T07:36:00","slug":"cybersecurity-these-are-the-internet-of-things-devices-that-are-most-targeted-by-hackers","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2019\/06\/26\/cybersecurity-these-are-the-internet-of-things-devices-that-are-most-targeted-by-hackers\/","title":{"rendered":"Cybersecurity: These are the Internet of Things devices that are most targeted by hackers"},"content":{"rendered":"\n<div class=\"wp-block-image\"><figure class=\"alignleft is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.cyberconservices.com\/wp-content\/uploads\/2019\/06\/monitor-1307227__340.jpg\" alt=\"\" class=\"wp-image-31699\" width=\"294\" height=\"202\"\/><\/figure><\/div>\n\n\n\n<p>By\u00a0<a href=\"https:\/\/www.zdnet.com\/meet-the-team\/uk\/dannypalmerzdnet\/\">Danny Palmer<\/a> &#8211;  Internet-connected security cameras account for almost half of the\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/www.zdnet.com\/article\/what-is-the-internet-of-things-everything-you-need-to-know-about-the-iot-right-now\/\" target=\"_blank\"><strong>Internet of Things<\/strong> devices<\/a>\u00a0that are compromised by hackers even as homes and businesses continue to add these and other connected devices to their networks.  <\/p>\n\n\n\n<p>Research from cybersecurity company SAM Seamless Network found that security cameras represent 47 percent of vulnerable devices installed on home networks.<\/p>\n\n\n\n<p>According to the data, the average US household contains 17 smart devices while European homes have an average of 14 devices connected to the network.<\/p>\n\n\n\n<p>\n\nBut while the range of connected devices ranges in scope from computers and smartphones to smart televisions and kitchen appliances, it&#8217;s&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/security-vulnerability-in-iot-cameras-could-allow-remote-control-by-hackers\/\">security camera systems<\/a>which are the most hacked IoT devices.\n\n<\/p>\n\n\n\n<p><a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/www.zdnet.com\/article\/cybersecurity-these-are-the-internet-of-things-devices-that-are-most-targeted-by-hackers\/&amp;ct=ga&amp;cd=CAEYAyoTNDEwNzY1NzcwMjY2NjgxMjk0NTIaYTJkNzVhMDE0OWE4MjFkNzpjb206ZW46VVM&amp;usg=AFQjCNElEz483wFskwcl7DXguW1We-sIvQ\">Read more: <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By\u00a0Danny Palmer &#8211; Internet-connected security cameras account for almost half of the\u00a0Internet of Things devices\u00a0that are compromised by hackers even as homes and businesses continue to add these and other connected devices to their networks. Research from cybersecurity company SAM <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2019\/06\/26\/cybersecurity-these-are-the-internet-of-things-devices-that-are-most-targeted-by-hackers\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[649,626],"tags":[650,627],"class_list":["post-31698","post","type-post","status-publish","format-standard","hentry","category-internet-of-things","category-iot","tag-internet-of-things","tag-iot"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/31698","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=31698"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/31698\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=31698"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=31698"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=31698"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}