Get A Quote News Contact Us Home Page About Us Carriers Services

Contact Us
Blog RSS Feed Like Us on Facebook Follow Us on Twitter Connect With Us

A smart TV user expressed his frustration after his TV became infected with malware when he was trying to install a movie streaming application. The TV used the now defunct Goggle TV platform, which fell victim to a ransomware scheme that was actually created to exploit Android devices like tablets and smartphones. The result was that his TV was completely locked, with no viable workaround.

Because the platform is no longer supported by Google, the only solution the TV manufacturer could offer was a $340 service repair.

Although this kind of ransomware attack is not common, users should still exercise caution when downloading apps, and make sure they are trustworthy. Bogdan Popa "Smart TV Running Google TV Bricked After Getting Infected with Malware," (Dec. 28, 2016).


Cybercriminals are increasingly looking for ways to exploit Internet-connected technologies, also called the Internet of Things (IoT).

Business Insider (BI) recently estimated that 34 billion devices will be connected to the Internet by 2020, an increase from 10 billion in 2015. According to the BI report, businesses looking to increase productivity, lower costs, and expand their markets will be the largest user of IoT technology. Government agencies will be second, with consumers representing the smallest group using IoT, although this group is still buying a vast amount of connected devices.

Protecting yourself may not be easy. Many devices that are connected to the Internet, like appliances, baby monitors, and wearables are closed, meaning the consumer cannot install security software. Although some manufacturers of IoT devices are beginning to take seriously the issue of security, smaller developers of connected devices may be so busy meeting the demand of the new products that security remains an afterthought.

Risk management experts from CSO urge employers to consider the security features of an IoT device when making purchasing decisions, and include those devices in their security monitoring procedures.

Posted by on January 19, 2017

Share |

No Comments

Post a Comment
Required (Not Displayed)

All comments are moderated and stripped of HTML.
Submission Validation
Change the CAPTCHA codeSpeak the CAPTCHA code
Enter the Validation Code from above.
NOTICE: This blog and website are made available by the publisher for educational and informational purposes only. It is not be used as a substitute for competent insurance, legal, or tax advice from a licensed professional in your state. By using this blog site you understand that there is no broker client relationship between you and the blog and website publisher.
Blog Archive

View Mobile Version
Home Page About Us Carriers Contact Us