Beware the Christmas gifts here is the most dangerous of 2015

Where there is Wi-Fi there is a potential danger. We can summarize the new report from Intel Security that puts us aware of the dangers from technological Christmas gifts.

In order to correlate the most popular Christmas gifts the most common risks related to the security of their personal data, Intel Security has released a list of gifts ” most hackable ” in 2015. Inside are gifts more ” dangerous ” in terms of computer and technology that, with a careless use, can deliver sensitive information to malicious users. It is a warning, especially for novice users who do not know how to act after receiving a technological gadget seemingly harmless.

According to data released by the Consumer-Electronics Association, worldwide about 160 million people give something of technology during the upcoming holiday season, with the most common gadgets that will be activity tracker, smartwatch, action camera and drones.

They are all devices that connect via Wi-Fi or Bluetooth, the connection protocol that can represent the weakest link in the ecosystem in terms of privacy and security of their data, especially if you use the gadget without having the full mastery of some basic concepts.

” As toys and electronic gadgets are the most popular gifts that will please many people this holiday season, consumers should be aware of the most common risks for their safety when they buy or receive a gift, ” said David Freer, executive Intel Security. ” Knowing the risks associated with Wi-Fi and Bluetooth’s connectivity is important, and you must use strong passwords together with the adoption of security solutions and keep these updated regularly for maximum protection. ”

The company reported what devices are ” more hackable ” of these holidays, the most vulnerable to potential attacks. Below the list.

  • Smartwatch and fitness tracker, wearable in general : they are becoming increasingly popular in recent years and will star in the Christmas sales. The hack of a smartwatch does not seem so obvious because of the integrated information unimportant to the cyber criminal, but in the latter affects the connection with your smartphone combined, from which information can be found remarkable for the owner’s account (SMS, email, can install malicious app).
  • Smartphones and tablets : among the most common tech gadgets ever, users often use very simple passwords to better store. Especially for the pairing of Bluetooth’s devices are the usual 0000 and 1234. An attacker can connect to your device with these codes via Bluetooth pretending connecting a dummy device and access sensitive data.
  • Drones and devices with cameras : this is also a big rise in the market value of more than $ 100 million in the US alone.
  • Gadgets for children : giving a technological object potentially vulnerable to a child must make sure that it is fully aware of the risks that must be met, especially when the device is connected via the Internet. It must also be caring parents make sure your child is making a suitable accessories, especially if they allow the sending and receiving audio and video content.

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More