Your Source for Security Cameras & Other Security Equipment

Security Camera and Surveillance Trends

Drones For Home Security

From law enforcement surveillance to recreational use by consumers, drones have grown in popularity over the years. Because of their advanced capabilities, a company has even created a drone home security system.

Proposed by Sunflower Labs, the system is designed to complement an existing alarm or security system. The drone streams video to your smartphone when a potential danger is detected, allowing you to determine whether you need to take further action or not.

The system is comprised of a drone plus in-ground smart lights used to detect motion, vibration, and sound. Using advanced data analytics, the system can differentiate humans from cars and animals. When there is a disturbance, artificial intelligence determines whether it is dangerous or not. For example, mail delivery persons will be recognized by their behavior (typically a quick stop by the front door or mailbox).

On the other hand, suppose a person approaches the back door and lingers. A push notification will be sent and you will be asked if you would like to look into the situation. Assuming you say yes, the drone will lift from its perch and autonomously fly to where the suspicious person is located. The drone will hover (30ft) until it is told to return to its nest. There is also an option within the app to alert local police.

By sending the drone to investigate first, Sunflower Labs CEO Alex Pachikov believes that this will decrease the number of false alarms. The drone also allows you to monitor your entire property instead of just entrances and exits, like most other security systems.

The drone is designed to be a minimal nuisance. Currently, the propellers automatically shut off if they hit anything, and considering its size, it is relatively quiet. The ultimate goal is decrease noises to a quiet hum and to get its weight down to half a pound (its current weight is two pounds) before it ships. In addition, it features two cameras which only capture footage of the home owner’s property in order to protect neighbors’ privacy.

Still, there are safety, privacy, and nuisance concerns about the drone. Since August, new rules allow operators who have passed an aeronautical exam to fly commercial drones under 55 pounds no higher than 400ft. And autonomous flying is not allowed for commercial drones.

Despite this, Sunflower Labs has no worries. They believe the policies will not apply as the homeowner will use the drone for non-business purposes. Since recreational users face fewer restrictions, homeowners will likely be held in the same regard.

As this system continues to develop, more details will emerge. As for now, the lights are expected to cost $159 each, and the drone may be rented for a fee (comparable to the cost of traditional alarm systems).

Would you consider utilizing this drone security system for your home? Share your thoughts with us on Facebook, Google+, Twitter, LinkedIn, and Pinterest!

For traditional security cameras and equipment, please visit SecurityCamExpert.com. If you have any questions or need assistance, please call us at 1-888-203-6294.

How Connected Technologies Can Help In Emergencies

Staying connected to your home is a convenience in itself, but in the case of natural disasters and emergencies, it can be an invaluable tool. If you live in an area prone to extreme weather, you likely have an emergency plan in place. However, a connected home can provide new and safer options to manage the situation.

Regardless of whether it is your home, vacation property, or even the home of a loved one, here are some ways connected technology can benefit you in the face of an emergency and beyond.

Crimes
Unfortunately, emergency evacuations mean abandoned homes and properties, which is ideal for looters. With connected security cameras, you can keep an eye on who might be entering your home, as well as monitor the possible damage occurring as a result of the natural disaster.

Smart Sensors
Installing water sensors can alert you of flood conditions and even slow leaks, which can cause significant damage over time if not detected early.

Aside from water sensors, carbon monoxide and gas detectors can save lives by alerting you when levels become dangerous.

Connected devices such as smart locks and garage doors often have motion detection sensors which notify you when someone enters or exits your home.

Remote Monitoring & Push Notifications
Because you can monitor from a safe distance, these are ideal in emergency situations. Push notifications provide up-to-date alerts which allow you to deal with situations in a timely fashion. Both enable you to monitor and understand what is going on without putting yourself in danger.

Affordable & Reliable Communication
Because these technologies seem so advanced, people often interpret this as complicated and expensive. However, this is not the case. There are various solutions on the market that offer relatively simple installation for cost-effective prices. Because the accessories and transmission processes have become more affordable over the years, connected technology is more accessible and easier to manage and maintain.

Insurance Discounts
You can possibly get a discount on your homeowner’s insurance if you install smart, connected devices. Many insurance providers are now offering discounts for those with smart homes. Some providers even partner with connected technology manufacturers to offer more incentives for customers.

Furthermore, choosing smart devices for your home helps to relieve emergency personnel and law enforcement agencies. Instead of entering an area affected by a natural disaster, you can check in on your property remotely to stay out of harm’s way and avoid interrupting the ongoing work of emergency personnel.

Peace Of Mind
As a whole, connected devices can offer some peace of mind in stressful, dire times. While these devices can be extremely helpful in disaster areas, all homeowners can benefit from a connected home.

Are you currently using any smart devices or connected technologies within your home? Share your experiences with us on Facebook, Google+, Twitter, LinkedIn, and Pinterest.

For the best affordable CCTV security and surveillance equipment, visit SecurityCamExpert.com or call 1-888-203-6294 today!

The Future Of Retail Loss Prevention

Loss prevention tactics began with in-store monitoring and patrol. As our technologies evolve and the popularity of online shopping continues to grow, security measures have improved. In fact, a U.S. retail fraud survey revealed that spending on store fraud prevention declined while online fraud prevention spending increased.

Because cybercriminals are constantly sharpening their skills, loss prevention specialists are using new technologies to their advantage as well. For example, data analytics have helped specialists understand suspicious behaviors and patterns in the e-commerce and m-commerce environment, and social media vigilance has helped to identify potential threats.

As the retail industry continues to expand and grow, what’s to come in the future of retail loss prevention?

Video Surveillance
It’s true that retail uses a variety of different technologies to operate, including point-of-sale transaction profiling as well as RFID tracking. However, now more than ever, video surveillance is playing a larger and smarter role.

With video surveillance, loss prevention officers have been able to catch thieves in the act and the recordings have provided excellent evidence. With the introduction of built-in facial recognition technology and video analytics, video surveillance can do so much more.

In the same vein, the smart features, connectivity and convenience put these devices at risk. While their role is to protect the business, retailers must do their part to protect their devices, data, shoppers, and employees.

IT & Outside Vendors
Because of this, loss prevention specialists must develop their knowledge and skills with the new technology. They should understand how to use data analysis to identify ever-changing criminal activities, such as new ideas, concepts and schemes.

Loss prevention specialists, cybersecurity specialists and IT team members must all work together to create a system that complies with privacy issues and maintains heightened security to prevent any data breaches or disasters.

Development Of New Responsibilities
As retailers begin to shift from their brick-and-mortar stores (some even closing completely) to focus on e-commerce and m-commerce, the role of data loss prevention specialists will morph into something new, which encompasses more aspects involved in keeping a company safe and secure.

What are your thoughts on the future of retail and loss prevention? Share your predictions and opinions with us on Facebook, Google+, Twitter, LinkedIn, and Pinterest!

Choose the best security cameras and CCTV surveillance equipment to protect your business or home. Visit SecurityCamExpert.com to browse our selection today!

Video Surveillance History

To better understand the current surveillance industry, you should know a little history. Without going into great detail, here are some important milestones of the video surveillance industry from the past decade.

Ten years ago, SD analog cameras and DVRs reigned supreme. While video management software and IP cameras were available, they had yet to become a mainstream solution.

Also around this time, some megapixel cameras were offered. They only supported MJPEG encoding (which made storage and transmission of these more expensive), but they boasted better quality than analog cameras.

And still in the early stages, but a topic of interest, were analytics, which had limited deployment during this time.

Around 2008-2012, IP cameras got a boost from the adoption of H.264 for megapixel cameras. Because IP camera usage was up, VMS software followed suit. The benefits of this upgrade were clear, making it easier for consumers to understand and accept the price increase.

As megapixel and IP cameras grew in popularity, interest in connecting cameras to the cloud was rising. While the dream was to eliminate any on-site recording and maintenance, bandwidth limitations and poor cloud VMS killed the dream.

In 2011, video analytics remained off the radar thanks to performance problems, unhappy customers, and ObjectVideo suing the industry. Even today, analytics are still slowly crawling out of the hole.

In the next few years, edge storage promised the elimination of NVRs and recorder appliances since the storage and software would be housed within the IP camera. Unfortunately, reliability issues deterred early adopters, and the introduction of inexpensive recorder appliances pushed edge storage to the back burner. Rather than becoming a main solution, edge storage was more commonly employed to provide redundancy for higher-end applications.

WDR & Low Light Conditions
Over time, surveillance camera technology has improved to better accommodate low light environments. Before, WDR (wide dynamic range) cameras, which automatically adjusted to harsh lighting conditions, were expensive and limited in availability. Low light performance was generally poor, and even worse in MP cameras (WDR in these were relatively non-existent). Today, the enhancements in quality are evident.

Smart CODECs
Smart CODECs dynamically adapt compression and I frame interval to scene conditions, which ultimately reduces bandwidth requirements and offsets the need to move to H.265. Within recent years, we have seen a rise in this technology. Moving forward, broad support of Smart CODECs will eventually drive down storage costs and remote network challenges.

HD Analog
For more than a decade, IP was the only practical way to deliver MP/HD, however the introduction of HD Analog has successfully killed off SD analog. HD analog uses coaxial cable for transmissions and has dominated sales for homes and small businesses. Some argue that it is just a temporary fix, while others say it will expand features and options to become a mainstay.

Cybersecurity
Cybersecurity has only recently become a major topic in video surveillance, however, many still brush it off. Though recent events have spurred concerns (ex. Sony hacking, Hikvision hacks, Axis’ major exploit), most users perceive a low risk of cybersecurity. As our systems become more connected, we can only hope that cybersecurity is better addressed and taken seriously among manufacturers and consumers alike.

Chinese Manufacturers
Chinese manufacturers have grown as contenders, with their earlier deployments showing poor quality and performance. However, over time, their products have improved and yet still maintain relatively low pricing. These manufacturers were originally OEM suppliers to Western brands, but recent years have shown their branded sales increase in the West.

Drive Down Costs
It seems manufacturers are in a current race to offer the lowest prices (whether to gain share or stay afloat) and consumers seem to be driving this shift. With numerous DIY and simple home solutions, we will see where the video surveillance industry is headed next.

What are your predictions for the future of video surveillance? Share your thoughts with us on Facebook, Google+, Twitter, LinkedIn, and Pinterest.

To shop our selection of security camera equipment and packages, please visit SecurityCamExpert.com. For questions about our products and installation services, or to schedule a free* site survey, please call 1-888-203-6294.

Video Surveillance In The Cloud

Businesses often turn to video surveillance to enhance security. In recent years, it has become a more feasible option for small businesses to employ cloud-based video surveillance due to lower costs and easy maintenance.

While some swear by the cloud, others are hesitant and worry about its security. If you are considering moving your video surveillance management to the cloud, you should get a better understanding of how it will work and how you can ensure that your data stays safe. Take these measures to ensure that your cloud-based video surveillance is as secure as it can get.

Is Your Hardware Secure?
Before you even think about cloud security, you must make sure that the equipment you have is free from security vulnerabilities. Do your homework and research different vendors’ reputation and history. Once you find a vendor you trust, make sure that your equipment is up-to-date with the proper software installed and in use. Maintain security by keeping your firmware current and using strong passwords. If your vendor has any other recommended best practices, be sure to follow them.

Vendor-Defined Cloud
Because the definition of “cloud” can vary from vendor to vendor, make sure you know exactly what your vendor is offering. When it comes to cloud service for video surveillance, you should be provided with camera management and data storage in the cloud. Your media infrastructure and value-added services should be managed in the cloud as well. Beware of vendors who advertise a cloud service, but really only offer remote access to a local device. This can be beneficial, but is limited in comparison to real cloud services.

Learn More About The Cloud & Data Center
If your cloud provider’s solutions are rooted on well-known cloud servers such as Amazon, Microsoft, or Google, you can rest assured that their general security is adequate. However, if they are using their own proprietary data center, you may want to proceed with caution. While there are secure clouds out there, you don’t know for sure how secure theirs is.

It is much easier to track a well-known cloud provider’s track record. For example, the Amazon AWS data center is supporting some of the largest internet services in the world. Their data storage environment is designed to limit the loss of data objects and is set for “encrypted at rest” which means it is stored encrypted in the cloud.

Camera To Cloud Connection
You should always understand how your system works. When it comes to your cloud-based video surveillance, you should know how your camera connects to the cloud. There are three different types of connections:

  1. No network configuration required
  2. Network configuration required
  3. The use of on-site device or gateway (not a cloud solution)

When it comes to your cloud solution, we will deal with the first two options only. If you prefer no network configuration required, your available options will be limited, but viable. Some vendors offer a solution to configure your cloud cameras with no network configuration, while others have built-in direct connections for your camera to the cloud.

Beyond that, any other cloud solution is likely a P2P solution, which tends to be less reliable than other options, so be sure to research your camera and cloud vendors.

The other option is to configure your own network to permit access to your own device from the internet. This is technically called “port forwarding” and, if done correctly, can be completely legitimate and safe way to configure your cameras. If you choose this route, here are some tips to boost security.

  1. As with everything else, choose a strong password.
  2. Ensure that all available firmware updates are applied.
  3. Ask your cloud provider for a list of IP addresses that will be used and white list them. This will create a very restricted list of servers that can connect to your device.

Implement these measures and work with your network or IT person and you have an adequate way to configure your cloud video surveillance system. You will avoid any black box P2P connections while opening up a huge list of cameras you can use for cloud surveillance.

Cloud To User Connection
Now that everything is in order, find out how the cloud makes your data available to you through its web or mobile apps. All your data and video is under their control, therefore the traffic from the cloud to your web browser or mobile app should be strongly authenticated with username and password and encrypted in transit using TLS, including standard web traffic and video streams.

While other limitations may occur (ex. bandwidth capacity), security concerns should not hold you back from cloud-based video surveillance. As evidenced, there are smart ways to keep your cloud video surveillance safe and secure. If done correctly, cloud-based video surveillance can offer a better solution than local storage solutions.

Does your business employ cloud-based surveillance? Share any tips or advice with us and your peers on Facebook, Google+, Twitter, LinkedIn, and Pinterest.

For a wide range of network IP security cameras, CCTV surveillance packages, and more, please visit SecurityCamExpert.com. If you have any questions and would like to speak to a representative, please call 1-888-203-6294.

Surveillance Video Analytics

Despite how it may be depicted on television or movie screens, reviewing surveillance footage to find evidence is a lengthy process. Sifting through hours, sometimes days, of footage is costly, time consuming, and, when done by humans, is rarely effective. Luckily, advanced technologies can save the day.

Originally, CCTV video footage was used to monitor retail stores or businesses to prevent theft, damage, or employee misconduct, and provide evidence if something were to happen. If nothing occurred, the storage would be overwritten because space was limited and the footage proved useless.

These days, storage capacity has increased and new data processing techniques make this footage extremely useful. The accessibility of recording devices with advanced features is changing the value of videos. And thanks to machine learning and video analytics, surveillance footage can be sorted and evaluated in a timely manner.

Video Analytics
Rather than wasting time and resources having humans evaluate footage, video analytics can take care of it. Video analytics is the process of extracting pertinent information from video footage. It basically works like image analytics, but goes a step further.

Image analytics can look at a still image to find patterns, anomalies, and identify faces. Video analytics can do the same, plus measure and track behaviors. Because of this, video analytics has a promising future within different industries.

The Use Of Video Analytics
Because this technology is great for identification, behavior analysis, and situational awareness, various businesses and industries can benefit greatly. Video analytics allows business owners to evaluate who visits their stores, identify peak hours, analyze customer behavior, and more. This gives businesses insight into how they can improve customer service and which deals or displays attract more customers. These types of insights can also benefit the marketing departments, as they can better understand customer demographic and tailor ads to those groups.

Video analytics can even be applied for security and law enforcement. Since body cameras for police are becoming widely adopted, these produce lots of video footage. Video analytics could make the recordings useful by adding rich tagging and indexing, making it easier to search through footage. Parsing through certain time periods and identifying persons with specific characteristics can help to develop leads and even recognize and predict different patterns.

For airports, stadiums and other major event and transportation venues, video analytics can evaluate footage and help to relieve congestion and lines. By monitoring these venues, more workers can be deployed to decrease wait times and improve customer service.

Video-Based Predictive Analytics
While still in the early stages, a new algorithm, as reported by MIT, allows a computer to predict human actions and interactions based on behaviors seconds before the action. The outlook for this algorithm is promising. As it develops, computers could eventually be taught to predict when a crime or injury may take place.

And as artificial intelligence (AI) and robotics become more feasible in our everyday lives, this type of machine learning and predictive analytics will be necessary for robots to interact with humans naturally.

An excellent example of these video analytics in action is Veenome for marketing. Its YouTube analytics tool helps advertisers choose which videos are better suited for them to display ads. Another example is Prozone for sports analytics. By analyzing video footage of the field, players’ stats can be recorded and more effective plays can be planned and executed.

These video-based predictive analytics can also help with decision-making in industries such as aviation, air traffic control, ship navigation, power plant operation, and emergency services. Accidents and crimes can be prevented, thus, potentially saving lives.

Video Gray Area
Of course, as it goes with all surveillance, privacy concerns arise. Currently, analytics where data collection does not require consent is still a gray area. Until laws are in place to protect the public as well as businesses, companies should consider employing video analytics ethically, with respect and privacy to the data and its consumers alike.

Want to share your thoughts on video analytics and its application in the real world? Connect with us on Facebook, Google+, Twitter, LinkedIn, and Pinterest.

To find an excellent array of quality security cameras and surveillance equipment at affordable prices, please visit SecurityCamExpert.com. If you have any questions or want to learn more about our services and equipment, please call 1-888-203-6294.

IP Video Surveillance For Your Business

Video surveillance can be an invaluable asset for businesses. It helps to improve security, manage risks, and boost efficiency. Most benefits of video surveillance can be seen and measure, however, determining its financial return isn’t as easy.

In order to better understand the fiscal value of IP video surveillance, security leaders consider the impact and effect of a hypothetical security event. This gives them better insight to how effective their surveillance system is. And by understanding how IP video surveillance adds value to your business, you demonstrate your overall dedication to success. Here are some of the ways IP video surveillance can influence and improve your business.

Protection
A common reason to employ IP video surveillance is to protect your property, employees, and customers. It can help to minimizes losses when it comes to a security incident, however, it can go further. The application of IP video surveillance can also ensure cyber security, data protection, intellectual property and brand reputation. By protecting these assets, a cohesive approach to risk management can be achieved.

Various Applications
Again, video surveillance goes beyond security and safety. It has become a fundamental aspect when building a business. Aside from monitoring on-site and remote locations, surveillance footage can be analyzed to improve employee productivity and help to measure the success of marketing campaigns. This data can be valuable across different departments, which adds to its value and merit.

Demonstrate ROI
There are different ways you can evaluate and determine the total cost of ownership for your system. For example, by investigating liability claims with video footage, you can save money and prevent future slip-and-fall claims. Some cases may be proven false, while others may bring to light new or unnoticed safety risks that can be addressed.

The stronger your system is, the more money you can potentially save. The most effective systems are comprised of enough cameras to cover all areas and detect crimes in progress, with highly trained staff to monitor the different feeds. A system that can do this as well as integrate the technology into all manner of law enforcement activities will demonstrate true ROI to security leaders.

Remote Monitoring
Remote monitoring is an excellent luxury of IP video surveillance. When alarms go off or unfamiliar activity is detected, rather than sending managers or guards to investigate, you are provided with alerts and can respond quickly and appropriately.

Building a system that meets these standards will be a great addition to your business. What other benefits do you enjoy with your video surveillance system? If you don’t have one now, are you considering implementing an IP video surveillance system for your business? Share with us on Facebook, Google+, Twitter, LinkedIn, and Pinterest.

We carry a great selection of IP video surveillance cameras, equipment, packages, and more. Visit SecurityCamExpert.com to browse our inventory or call 1-888-203-6294 to speak with a representative.

Scene Recognition Technology

While different types of biometric technology (ex. iris scanners, facial recognition) have been in the news, talk of artificial intelligence (AI), namely scene recognition, has mostly evaded the spotlight. If you are not familiar with scene recognition, it is basically a form of artificial intelligence that allows a device to categorize the features and objects in a photo or video much like our brains would. The process is comparable to the way Google Now or Siri comprehend voice commands, but with visual content instead.

To put the complexity of scene recognition technology into perspective, think about the many ways we can pronounce words and still be understood by a person or device. These possibilities seem minimal in comparison to the different shapes and positions a cat can assume and still be recognized as a cat, for example. This is just one of the many reasons why creating a scene recognition algorithm has been a long time coming. However, we are getting closer to its inception.

The first hints at this come in the form of the Nest Aware feature of the Nest Outdoor Camera. This feature can distinguish between humans and other things, such as a deer or butterfly or other natural phenomena, which may cause movement in a scene. This shows that cameras have the potential to sort useless parts of surveillance footage.

Security cameras with scene recognition could be very beneficial in different settings and scenarios. For example, scene recognition cameras could identify if a robber has entered your home, or, if you are keeping an eye on an elderly loved one remotely, you could be alerted if he or she has fallen. Because this technology takes motion detection much further, it can change the security and surveillance camera industry for the better.

Until scene recognition is more developed and refined, we likely won’t be hearing too much about it. Also, for those wary about surveillance already, having AI within the home may not be as comforting as it may be to others.

What are your thoughts on scene recognition? Would you employ a security camera with scene recognition? Share your thoughts with us on Facebook, Google+, Twitter, LinkedIn, and Pinterest!

Shop our selection of affordable security cameras, CCTV surveillance packages, and more at SecurityCamExpert.com. Call 1-888-203-6294 to inquire about site surveys and installations services.

Prevent Burglaries

People often take vacations over the summer, which makes it no surprise that July and August are the months with most break-ins. If you’re going away for a little vacation, use these tips to help keep your home and property safe.

Think Like A Burglar
Take a look at your home and think about the ways you would try to break in. These spots should be reinforced with extra security. You may also want to consider concealing your valuables. If burglars can see something they want through a window, they may be more likely to target that home.

Take Inventory
Take pictures of your home and your belongings before you leave. In case a burglar does target your house, the photos can help to document any damage and help you create an inventory log with estimated values of your items. Both of these can be especially helpful for insurance purposes.

Secure Indoors
These will need to be adjusted if you have a house sitter or pet sitter coming and going, but, in general, you should:

  • Update your security cameras or ensure they are working properly before your trip. If your system allows remote access, be sure that you have the proper device, application, and/or log in information to do so.
  • Store your valuables in a safety deposit box.
  • Lock all windows and close most of the shades.
  • Use a timer for your lights to make it appear as if someone is still home.
  • Set your alarm and security system before you leave.

To avoid returning to damaged property, turn off and unplug electronics, such as TVs, computers, or other devices, that could be damaged in the event of power surges. Depending on the length of your vacation, you may want to consider turning off the water and gas as well.

Secure Outdoors

  • Don’t leave hidden spare keys outside of your home.
  • Park your car inside your garage.
  • Mow the lawn and trim the hedges.
  • Move ladders or any other supplies that burglars could use to get to the second story.

Neighborly Love
If possible, get your neighbors involved. Choose a trusted neighbor or two and politely ask them if they can keep an eye on things while you’re away, and offer to do that same if they leave. You can have the post office hold your mail, or have your neighbors pick it up, as well as any ads or flyers left on your door. You may also ask them to mow your lawn, trim plants, and set out trash cans, even if they are empty. This will help to keep up the charade that someone is occupying the home. Lastly, consider giving your most trusted a neighbor a spare key in case of emergencies.

Do you have any other tips to share? Find us on Facebook, Google+, Twitter, LinkedIn, and Pinterest.

If you’re looking to upgrade or add a surveillance system to your home or business, please visit SecurityCamExpert.com. We carry a vast selection of quality security cameras, CCTV surveillance packages, and more at affordable prices. To schedule a free site survey or learn more about our installation services, please call 1-888-203-6294.

Security Flaws Of Smart Home Systems

Smart homes allow you to connect different aspects of your home, including things like appliances, alarms, and sensors. Most find this concept alluring since you can control your appliances and home security remotely, allowing you peace of mind whether you are at home or away.

With the convenience provided by these smart home systems comes considerable risk. Some devices, while acting as a helpful tool, could end up hurting you if access to your system fell into the wrong hands.

In hopes to identify potential security risks and call attention to producers of smart home systems and devices, a team made up of Earlence Fernandes, Jaeyeon Jung, and Atul Prakash joined forces to look at different systems. The systems under study were those that were larger and more popular with consumers. They looked at common features, how devices interacted with each other, which third-party apps were supported, and most importantly, security features, among other aspects.

From this study, two major flaws were found:

Privileges
Akin to your smartphone asking for permission to access certain things on your phone, certain smart home devices and apps can access different functions with your permission. The problem therein lies in how these functions are grouped together.

For example, if an app can automatically lock a door after 9pm, it likely has the privilege to unlock it, although that function is not necessary. The app developer cannot ask for permission to lock a door without the ability to unlock it.

Most apps have access to more functions than they need, putting your security at risk.

Messaging
Because devices and apps can communicate through messaging (think instant messenger), sensitive data sent through this system can be vulnerable. For example, a door lock’s PIN code may be sent in a message. Since these messages are not entirely secure, any software that has the most basic access to your device can receive all the messages that the device generates or receives.

Other apps can also “impersonate” smart home equipment, in that, they can send messages that look like messages sent from real smart home devices. The phony app could possibly read and steal the network’s ID and then create a message.

Testing The Flaws
The team of researchers then created four different attacks to show how attackers could use the aforementioned flaws to their advantage.

For the first attack, they created an app that’s purpose was to simply monitor battery levels of various wireless devices around the home. However, after a user downloads the app, it can be reprogrammed to monitor other messages sent by those devices.

In the second attack, they were able to listen to the supposedly secure messages between an app and its companion mobile device. The team was able to impersonate the mobile device and send commands to the app, such as creating a new PIN which would give an attacker access to your home.

The third and fourth attacks involved disabling and enabling different functions. For example, a custom app could disable “vacation mode,” which allows the system to turn lights on and off to make the home seem as if it is occupied. Another app was able to falsely trigger a fire alarm by acting as a carbon monoxide monitor.

Security Improvements
Just because smart home systems currently have security flaws does not mean these systems and the Internet of Things do not have great potential. As of now, if you are considering adopting a smart home system, much like anything else, proceed with caution. You might want to think twice about giving third party apps access to your devices, and do some research on the security of the system you choose.

As security and technology improves with these systems, the Internet of Things and smart home systems will likely see much wider adoption. This could eventually lead to better quality of living.

Have you considered adopting a smart home system now or in the future? Do you currently employ any smart home devices? Share your thoughts and experiences with us on Facebook, Google+, Twitter, or Pinterest.

For an excellent selection of security cameras, CCTV surveillance packages, security equipment, and more, please visit SecurityCamExpert.com. If you have any questions, please call 1-888-203-6294.

Recent Comments