Advancements in surveillance technology and increased reliance on smart devices have caused a perfect storm for cybercriminals looking to steal data, hold users to ransom or surveil their targets. It comes as a recent study, from a family law firm, also revealed one in five spouses use spy gear including installing spyware on their partner’s phones.
Smart appliances in the home have increased by 300 percent as people are becoming more reliant on devices that promise to make their homes safer and their lives easier.
It comes as software development company BespokeSoftwareSolutions told Express.co.uk that one in five spouses use spy gear such as tracking devices, dash cams, and spying software on mobile phones on their partners before a divorce.
Alarmingly, a recent report by Which? revealed that a home with smart gadgets could be vulnerable to 12,000 hacking attacks in a single week.
The company created a fake smart home and set up a range of real consumer devices including televisions, thermostats, smart security systems and a smart kettle.
The investigations revealed a deluge of attempts by cybercriminals trying to break into the devices.
At one stage, the devices reached as many as 14 hacking attempts every hour.
This confirmed that most devices were able to fend off an assault but a wireless camera was successfully targeted and a stranger used to attempt to spy on the home.
The company found that the vast majority of hacking attacks come from Russia, China, India, the Netherlands and the US
READ MORE: Russia install ‘satellite blinding’ laser system
Which? reveals ways to reduce the likelihood of attacks by hackers on devices.
The company warned consumers a weak default password is the easiest way for a device to get hacked so urges users to change any password that comes with the product.
Using two-factor authentication and installing any security updates available is also a good way to keep smart devices secure.
They warn consumers to be wary of any phishing messages they may receive, which can enable a hacker to fully compromise the device.