CHAPTER 3

image

B

baby monitor hacks: Internet-connected baby monitors allow parents to monitor a child’s crib. They seldom encrypt the video stream and they can be easily hacked because of inadequate security features. A baby monitor can also be used as an attack vector to penetrate a home’s wireless network and monitor other activity. This is a fairly simple hack made possible by finding a device on the same frequency as target device. High-end baby monitors have adjustable frequencies and people tend to use default or simple passwords.

backdoor: Typically, unauthorized hidden software or hardware mechanism used to circumvent security controls. SOURCE: ...

Get Cybersecurity Lexicon now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.