Enhanced Hacking Risk Globally: 25 Million Home Voice Assistants at McAfee

Over 25 million voice assistants universally which are connected to the Internet of Things (IoT) devices at home are at an increased hacking risk as cybercriminals are manipulating elementary susceptibilities present, a new report by cyber-security firm McAfee revealed on May 13.

“Most Internet of Things is being co-operated by exploiting basic vulnerabilities, such as insecure default settings and easily guessable passwords” said Raj Samani, Chief Scientist and McAfee Fellow at McAfee.

“From building botnets, perpetrating click fraud to stealing banking credentials, or threatening reputation damage unless a ransom is paid, and money is the ultimate goal for criminals,” added.

According to McAfee “Mobile Threat report”, a 550 percent increase in customer security risks connected to malicious and fake apps in the second half of 2018.

“Most remarkably, the numerous fake app detections by McAfee’s Global Threat Intelligence increase from 10,000 in June 2018 to nearly 65,000 in December 2018,” said the report.

Cybercriminals are looking for ways to use right-hand devices to gain control of IoT devices via password exploiting and cracking other susceptibilities, such as through the exploitation via voice assistants.

“The broad access and rapid growth to connect IoT devices push us to deliver revolutions with our partners that go beyond traditional antivirus. We are creating resolutions that address real-world digital security challenges,” is said by Gary Davis, Chief Consumer Security Evangelist at McAfee.

McAfee also prolonged its partnership with Samsung to safeguard customers from cyber-security threats on Galaxy S10 smartphones.

John Woods is a self-professed security expert; he has been making the people aware of the security threats. His passion is to write about Cyber security, malware, social engineering, Games,internet and new media. He writes for McAfee products at mcafee.com/activate.

Leave a Reply

Your email address will not be published. Required fields are marked *