10th Indian Delegation to Dubai, Gitex & Expand North Star – World’s Largest Startup Investor Connect
Cyber Security

This ‘Amazon’s Choice’ video doorbell could let just about anyone spy on you


Does your video doorbell look anything like the one in the picture? Perhaps you bought it for cheap at Amazon, Temu, Shein, Sears, or Walmart? Does it use the Aiwit app?

Consumer Reports is reporting the security on these cameras is so incredibly lax, anybody could walk up to your house, take over your doorbell, and permanently get access to the still images it captures — even if you take control back.

The cameras are sold by a Chinese company called Eken under at least ten different brands, including Aiwit, Andoe, Eken, Fishbot, Gemee, Luckwolf, Rakeblue and Tuck. Consumer Reports says online marketplaces like Amazon sell thousands of them each month. Some of them have even carried the Amazon’s Choice badge, its dubious seal of approval.

Yet Amazon didn’t even respond to Consumer Reports findings last we’d heard, much less pull the cameras off its virtual shelves. Here’s one of them on sale right now. Shopping app Temu, at least, told CR it would halt sales after hearing just how incredibly easy they are to hack.

Frankly, “hack” might be too strong a word

Not only do these cameras reportedly expose your public-facing IP address and Wi-Fi network in plaintext to anyone who can intercept your network traffic (hope you aren’t checking them on public Wi-Fi!), they reportedly broadcast snapshots of your front porch on web servers that don’t ask for any username or password.

One Consumer Reports security staffer was able to freely access images of a colleague’s face from an Eken camera on the other side of the country, just by figuring out the right URL.

Worse, all a bad actor would need to figure out those web addresses is the serial number of your camera.

Even worse, a bad actor could get that serial number simply by holding down your doorbell button for eight seconds, then re-pairing your camera with their account in the Aiwit smartphone app. And until you take control of your own camera again, they’ll get video and audio as well.

Worse still, that bad actor could then share those serial numbers with anyone else on the internet. Consumer Reports tells us that once the serial number is out in the wild, a bad actor can write a script that would just keep downloading any new images generated by the camera.

“Your privacy is something that we value as much as you do,” reads Eken’s video doorbell website.
Image: Eken

I guess you could say “Well, these cameras only face outdoors and I don’t care about that,” but Eken advertises indoor-facing cameras as well. (Consumer Reports tells us it hasn’t tested other Eken models yet.) I also really don’t want bad actors to know exactly when I leave my home.

You might say “Ah, this isn’t a big threat because a bad actor needs local access to the camera” — but that assumes they can’t figure out a way to randomly hit upon working serial numbers, or recruit porch pirates to canvas neighborhoods. At least the serial numbers seem to be randomized, not incremental, Consumer Reports tells us.

You also might say “Won’t Eken just stop hosting these images at freely accessible URLs?” That’d be good, but it apparently couldn’t be bothered to respond to Consumer Reports requests for comment.

Do the Aiwit servers do anything at all to prevent hackers from just randomly trying URLs until they find images from people’s cameras? If so, Consumer Reports hasn’t seen it yet.

“I have made tens of thousands of requests without any defense mechanisms triggering,” Consumer Reports’ privacy and security engineer Steve Blair tells The Verge via a spokesperson. “In fact, I was purposely noisy (hundreds of requests at once, from a single IP/source, repeated every couple of minutes) to try to determine if any defenses were present. I did not see any limitations.”

At least Consumer Reports isn’t yet suggesting this has been exploited in the wild.

We didn’t independently confirm these flaws, but we did read through the vulnerability reports that CR shared with Eken and another brand named Tuck. And it wouldn’t be the first time a “security” camera company has neglected basic security practices and misled customers.

Eken sells a wide variety of video doorbells under an even wider variety of brands. Consumer Reports points out that the buttons and sensor spacing are similar, though.
Image: Eken

Anker admitted its always-encrypted Eufy cameras weren’t always encrypted after my colleagues and I were able to access an unencrypted live stream from across the country, using an address that, like Eken, consisted largely of the camera’s serial number.

Meanwhile, Wyze recently let at least 13,000 customers briefly see into a stranger’s property — the second time it’s done that — by sending camera feeds to the wrong users. And that was after the company swept a different security vulnerability under the rug for three whole years.

But the Eken vulnerability might even be worse, because it sounds far easier to exploit, and because they’re white-labeled under so many different brands that it’s harder to protest or police.

Consumer Reports says that even after Temu pulled some of the worrying doorbells, it kept selling others — and that as of late February, despite its warnings to retailers, most of the products it found were still on sale.



Source link

by 9to5mac

As the world becomes more digital, the requirement for cyber defense has never been greater. As businesses, governments, and citizens depend greatly on technology, the cybersecurity practice is expanding very quickly in 2025. From data theft to ransomware attacks, the danger has evolved to be sophisticated, forcing companies to invest in innovative cybersecurity measures. Consequently, career prospects in this area are flourishing. Whether you are a student, IT personnel, or an individual thinking of changing their vocation, learning the cybersecurity scope in the future will prepare you for a very rewarding and sought-after profession. Why Cyber Security Matters More Than Ever With sudden digitization in all sectors, cyberattacks have also kept pace. Be it any organization, a small startup, or a multinational corporation, everything is now a cybercriminal target. With increasing threats, the scope of cybersecurity widens to include everything from network security to cloud security and ethical hacking. In 2025, cybersecurity is no longer an IT problem — it’s a business necessity. This evolution guarantees that experts with cybersecurity knowledge will continue to be in greater demand.  Cyber Security Scope in India: Rising Demand and Opportunities   India is one of the fastest-growing digital economies and is seeing a higher demand for cyber protection. The government is promoting initiatives like Digital India, and more businesses are going online. As a result, the cybersecurity scope in India has expanded significantly. Every sector, from banking and healthcare to e-commerce and education, is vulnerable to cyber threats.   Major Indian cities like Bangalore, Hyderabad, Pune, and Delhi are becoming hubs for cybersecurity. They offer attractive job roles and competitive salary packages to skilled professionals.   Key Areas Expanding Cyber Security Scope in the Future   Here are the major areas contributing to the growing scope of cybersecurity in the future:   1. Cloud Security   As companies move to cloud platforms like AWS, Azure, and Google Cloud, protecting data on these platforms is crucial.   2. IoT Security   As smart devices increase, so do vulnerabilities. IoT security ensures that everything from smart homes to industrial sensors is protected.   3. AI and Machine Learning in Cyber Security   Artificial intelligence is used to detect threats in real time, predict attacks, and automate responses. This technology is reshaping the scope of cybersecurity dramatically.   4. Blockchain Security   With the rise of Web3 and decentralized finance (DeFi), blockchain security is becoming an important area within the future scope of cybersecurity. Careers in Cyber Security (2025) The increasing cybersecurity scope in India has created many exciting job roles across industries. Below you will see some high-demand roles in 2025: Job Roles  Average Security salary (per annum)  Security Analyst ₹6–8 Lakhs Penetration Tester (Ethical Hacker) ₹8–12 Lakhs Cyber Security Consultant ₹10–15 Lakhs Security Architect ₹20–25 Lakhs Chief Information Security Officer (CISO) ₹40 Lakhs and above Each of these job roles contributes in its unique way to bolster the total digital defense of an organization, further expanding the cybersecurity scope nationally and globally. In-Demand Skills for Cybersecurity Roles You will need a strong skillset, both technical and …

by Team SNFYI

As senior citizens embrace the digital age, they are finding themselves at a greater risk than ever before. With unfamiliar technology and fast-evolving fraud tactics, it’s no surprise that more and more cybercrime victims are over 50—many losing not just money, but their sense of security and trust.  In response to this growing crisis, Truecaller, the leading global communications platform, has announced a transformative partnership with Khyaal, India’s number one app for senior citizens, committed to the empowerment and well-being of India’s elderly. This collaboration uniquely blends Khyaal’s deep understanding of seniors and expertise in creating meaningful engagement, along with Truecaller’s cutting-edge caller identification technology. Together, they create a robust and secure shield that fosters trusted, reliable communication, building a safer and more connected community for India’s elderly population.  All Khyaal members will receive an exclusive 50% discount on Truecaller Premium membership, ensuring they have access to the most advanced caller identification and spam protection features. Additionally, as part of this comprehensive safety initiative, Khyaal and Truecaller will co-create dedicated educational content. This includes “New Scam Highlights” sessions that decode emerging fraud tactics, interactive “Spot the Scam” workshops and contests, essential guidelines for handling calls from unknown numbers, and powerful testimonials from Khyaal seniors who have successfully identified and avoided scam attempts. These initiatives will be delivered through a mix of digital and on-ground formats. Seniors will have access to the workshops and sessions on the Khyaal app. The partnership will extend beyond digital boundaries through Khyaal’s “50Above50″ event, featuring interactive awareness sessions and dedicated safety booths that offer seniors practical, hands-on education and insights on digital safety.” While the free version of Truecaller is also functional, the Premium subscription includes enhanced spam blocking and several advanced safety features which can better protect senior citizens against fraudulent and unwanted communication. This technology-driven approach provides an additional layer of prevention, complementing Khyaal’s ongoing efforts to empower seniors through education and solutions to create a safer world for seniors. “The digital age holds tremendous promise for our seniors—offering connection, convenience, and community. But it also brings new threats they’re often unprepared for,” said Rishit Jhunjhunwala, Global CEO, Truecaller. “We’ve heard far too many heartbreaking stories of older individuals duped by scams. Our partnership with Khyaal is a meaningful step toward equipping them with the knowledge and tools to navigate this landscape safely.” Commenting on the partnership, Hemanshu Jain, Founder & CEO, Khyaal said, “The statistics are deeply concerning: seniors are losing their hard-earned savings to increasingly sophisticated scammers who exploit their trust and unfamiliarity with digital fraud tactics. The emotional toll of falling victim to such scams can be devastating, often leading to anxiety and a loss of confidence in using digital tools. At Khyaal, we’ve long recognised this silent crisis and have been committed to raising awareness through digital workshops. This partnership with Truecaller takes that commitment further. By learning to identify red flags, equipping themselves with the right tools like Truecaller, and staying informed about emerging scam tactics, seniors can maintain their independence while protecting themselves …

by Team SNFYI

For years, global supply chains have operated on a fundamental faith: that if materials are moving, everything is working. That approach worked — until cybersecurity threats became not only routine, but sophisticated and devastating. Data leaks and ransomware are no longer affecting individual businesses due to the emergence of advanced persistent threats. They send ripples through supply networks and have an impact on national security, financial systems, and basic services. This is particularly true for industries linked to government contracts. Where sensitive defense information passes through hundreds of subcontractors, an individual organization’s approach to security becomes a part of the broader risk. This isn’t just about protecting one company’s data — it’s about protecting entire ecosystems. Acknowledging this, the Department of Defense of the United States introduced a framework-based cybersecurity certification model. Among these, the Cybersecurity Maturity Model Certification — CMMC — is a key cornerstone in the effort to reform how government supply chains can operate securely. With ever-changing policy developments and recent announcements, CMMC updates are now shaking up the landscape for contractors, suppliers, and service providers. Why CMMC News Matters In The Current Scenario The cybersecurity environment for federal contractors is changing. The DoD’s implementation of CMMC, first announced in 2020, remains a work in progress. Changes, updates, and policy updates all mean companies need to be watching the CMMC news to stay compliant. CMMC implements a tiered approach for cybersecurity requirements for businesses doing business with the DoD that have access to FCI and CUI. Unlike self-attestation models, CMMC requires third-party assessments, especially for businesses participating in higher-risk jobs. Recent news updates have included: These shifts are not optional. And not meeting CMMC requirements now can result in disqualification from doing business with the DoD altogether. That should have supply chain companies in manufacturing, technology, logistics, and more reading about CMMC news. Supply Chains On Red Alert for Cybersecurity And big financial institutions, health care providers, and other operators of critical infrastructure are all taking notice. CMMC marks a move to formal, enforceable cybersecurity standards, in contrast to voluntary guidelines. Industry experts also note that CMMC’s configuration, including third-party accreditation and defined levels of maturity, as well as publicly trackable compliance, could serve as a model for future regulatory efforts in various industries. Staying Current on CMMC News: Why It Matters Given that CMMC is rapidly evolving, not being current isn’t an option. Policy changes, interim rules and enforcement updates revise timeframes and alter compliance expectations. Firms that are constantly kept abreast of the CMMC can enjoy several benefits, some of which are mentioned in the rundown: Final Thoughts As cyber threats become increasingly sophisticated, organized certification frameworks such as CMMC are becoming the rule rather than the exception. For contractors, suppliers and service providers, keeping up to date with CMMC news is about more than checking compliance boxes. This is a matter of future-proofing business activity and staying up to date to continue operating in markets that are becoming increasingly security-aware. As the bar for …