Security Vulnerabilities in Top Christmas Gifts

Security Vulnerabilities in Top Christmas Gifts

Internet connected devices might be the hot item for Christmas this year, but are they secure?

Smart devices are on everyone Christmas list this year. From smart assistants to connected toys, everyone wants an Internet of Things device under the tree. But before you go gifting these top gifts this holiday season, it might be worth it to check whether or not it is one of the good ones.

Mozilla has produced a ranking of 70 top gifts this holiday season based on its security risk level. Each device was graded on a number of measures including the data it collects, is the data encrypted and when is it transmitted. Mozilla also looked at who the data is shared with and what is the worst-case scenario if something did go wrong. 

Here are just a few products that received the lowest scores on the list, a few might surprise you.

FREDI Baby Monitor

The FREDI Baby Monitor was on Mozilla's list as one of the "creepier" devices. The product, made to help parents check in on their little ones has a camera and microphone with connected app. According to Mozilla, the product does not use encryption and does not require the user to change the default password of "123," easily making the camera hackable. The camera also does not have automatic security updates, a way to fill in any holes that are vulnerable.

Mozilla says that the "product does a seemingly poor job protecting privacy and security." Potentially, someone could, and it has been proven before that they can, access the video feed and spy on the user and its family. 

Dobby Pocket Drone

This drone is one of the smallest and cheapest drones on the market this holiday season. The device touts HD video, 360-degree views and a size that will literally fit in your pocket. However, without a minimum security standard and privacy policy, it doesn't matter if this drone can fit in your pocket. 

Mozilla says this product doesn't fit the bill for their security standards and the relaxed security of the device could lead to videos being taken by someone else or your location data stolen by someone you don't know.

Petzi Treat Cam

This camera designed to allow pet owners peek in on their pets when they are not home seems like a good idea. The device allows you to see, talk and fling treats at your pet through a connected app. It's wide-angle lens, high quality audio and app might make you think this is the perfect gift for your friend who is obsessed with their dog, but alas, this device did not meet Mozilla's minimum security standards.

The device does use encryption, but the right kind of hacker can, and will, use the device to spy on you and your dog. With the trendy functionality of the smartphone application, the hacker can also post pictures of your and your dog on social media. Creepy.

Click here to browse through all the products evaluated by Mozilla.

About the Author

Sydny Shepard is the Executive Editor of Campus Security & Life Safety.


  • Progressing in Capabilities

    Progressing in Capabilities

    Hazardous areas within industries like oil and gas, manufacturing, agriculture and the like, have long-sought reliable video surveillance cameras and equipment that can operate safely in these harsh and unpredictable environments. Read Now

  • A Comprehensive Nationwide Solution

    A Comprehensive Nationwide Solution

    Across the United States, manufacturing facilities, distribution centers, truck yards, parking lots and car dealerships all have a common concern. They are targets for catalytic converters. In nearly every region, cases of catalytic converter thefts have skyrocketed. Read Now

  • Planning for Your Perimeter

    Planning for Your Perimeter

    The perimeter is an organization’s first line of defense and a critical element of any security and surveillance program. Even if a building’s interior or exterior security is strong, without a solid perimeter surveillance approach any company or business is vulnerable. Read Now

  • The Key Issue

    The Key Issue

    It is February 2014. A woman is getting ready in her room on a cruise ship when she hears a knock on the door; it is a crewmember delivering breakfast. She is not presentable so she tells him to leave it by the door. Read Now

Featured Cybersecurity

New Products

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3

  • VideoEdge 2U High Capacity Network Video Recorder

    VideoEdge 2U High Capacity Network Video Recorder

    Johnson Controls announces a powerful recording solution to meet demanding requirements with its VideoEdge 2U High Capacity Network Video Recorder. This solution combines the powerful capabilities of victor with the intelligence of VideoEdge NVRs, fueled by Tyco Artificial Intelligence, for video management that provides actionable insights to save time, money and lives. 3

  • CyberAudit Introduced to Manage Systems, Intuitive Interface

    CyberAudit Web

    CyberLock, Inc. announces the release of CyberAudit Web 9.4! CyberAudit-Web (CAW), the software suite for managing CyberLock systems, provides an intuitive interface to assign keys, set expirations, monitor staff and configure access schedules. 3