{"page":"\u003clink rel=\"stylesheet\" href=\"https://lessonplanet.com/assets/packs/css/resources-c03aa079.css\" /\u003e\n\u003clink rel=\"stylesheet\" href=\"https://lessonplanet.com/assets/packs/css/lp_boclips_stylesheets-517835be.css\" media=\"all\" /\u003e\n\u003cdiv data-title='Cyber security in smart devices: how big is the threat?' data-url='/boclips/videos/5c54d2cfd8eafeecae1e4a81' data-video-url='/boclips/videos/5c54d2cfd8eafeecae1e4a81' id='bo_player_modal'\u003e\n\u003cdiv class='boclips-resource-page modal-dialog panel-container'\u003e\n\u003cdiv class='react-notifications-root'\u003e\u003c/div\u003e\n\u003cdiv class='rp-header'\u003e\n\u003cdiv class='rp-type'\u003e\n\u003ci aria-hidden='true' class='fai fa-regular fa-circle-play'\u003e\u003c/i\u003e\nVideo\n\u003c/div\u003e\n\u003ch1 class='rp-title' id='video-title'\u003e\nCyber security in smart devices: how big is the threat?\n\u003c/h1\u003e\n\u003cdiv class='rp-actions'\u003e\n\u003cdiv class='mr-1'\u003e\n\u003ca class=\"btn btn-success\" data-posthog-event=\"Signup: LP Signup Activity\" data-posthog-location=\"body_link_boclips\" data-remote=\"true\" href=\"/subscription/new\"\u003e\u003cspan\u003e\u003cspan\u003eGet Free Access\u003c/span\u003e\u003cspan class=\"\"\u003e for 10 Days\u003c/span\u003e\u003cspan\u003e!\u003c/span\u003e\u003c/span\u003e\u003c/a\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003cdiv class='rp-body'\u003e\n\u003cdiv class='rp-info'\u003e\n\u003cdiv aria-label='Hide resource details' class='rp-hide-info' role='button' tabindex='0'\u003e\u0026times;\u003c/div\u003e\n\u003ci aria-label='Expand resource details' class='rp-expand-info fai fa-solid fa-up-right-and-down-left-from-center' role='button' tabindex='0'\u003e\u003c/i\u003e\n\u003ci aria-label='Compress resource details' class='rp-compress-info fai fa-solid fa-down-left-and-up-right-to-center' role='button' tabindex='0'\u003e\u003c/i\u003e\n\u003cdiv class='rp-rating'\u003e\n\u003cspan class='resource-pool'\u003e\n\u003cspan class='pool-label'\u003ePublisher:\u003c/span\u003e\n\u003cspan class='pool-name'\u003e\n\u003cspan class='text'\u003e\u003ca data-publisher-id=\"30356011\" href=\"/search?publisher_ids%5B%5D=30356011\"\u003eCurated Video\u003c/a\u003e\u003c/span\u003e\n\u003c/span\u003e\n\u003c/span\u003e\n\u003c/div\u003e\n\u003cdiv class='rp-description'\u003e\n\u003cspan class='short-description'\u003eUS CES SECURITYSOURCE: AP HORIZONS, LIFESTYLE, HEALTH AND TECHNOLOGY RESTRICTIONS: HORIZONS CLIENTS AND AP LIFESTYLE, HEALTH AND TECHNOLOGY CLIENTS ONLYLENGTH: 5.07SHOTLIST: AP TelevisionLas Vegas, US - 5 January 20171. Wide of car2. Pan...\u003c/span\u003e\n\u003cspan class='full-description hide'\u003eUS CES SECURITYSOURCE: AP HORIZONS, LIFESTYLE, HEALTH AND TECHNOLOGY RESTRICTIONS: HORIZONS CLIENTS AND AP LIFESTYLE, HEALTH AND TECHNOLOGY CLIENTS ONLYLENGTH: 5.07SHOTLIST: AP TelevisionLas Vegas, US - 5 January 20171. Wide of car2. Pan shot of dashboard3. Thomas Bloor, Global Business Development Manager, Blackberry, getting into a Lincoln MKZ autonomous driving prototype car4. BlackBerry QNX logo5. SOUNDBITE: (English) Thomas Bloor, Global Business Development Manager, Blackberry: \"The most secure phones on the planet, you know, the phones that had never been hacked and we're bringing all the expertise and the skill set from those security people into the automotive space. Obviously as cars get more and more connected, then the threat of hacking becomes more prevalent.'' 6. Screen showing LIDAR (Light Detection and Ranging) signatures on a screen inside prototype7. Bloor waving hands in front of car8. Bloor's LIDAR signature on screen 9. SOUNDBITE: (English) Thomas Bloor, global business development manager, Blackberry: \"QNX is one of the growth engines for the company moving forward and we're investing very heavily in developing a lot of more advanced capabilities in things like autonomous drivers in the car I'm sitting today and virtualization solutions to help reduce costs for automakers, bringing advanced technologies into their cars.\"Las Vegas - 3 January 2017 10. Various of Internet-capable devices on display at Stringify booth at CES Unveiled Las Vegas - 4 January 2017 11. SOUNDBITE: (English) Rammohan Malasani, CEO, Securifi: \"You know, we're still in the very early stage for smart home. So I think we'll have like 40, 50 devices per home in five years from now. So everything is connected to the Internet so imagine if everyone of them becomes a pawn in like this big army that can be used to attack any service site that you want.''12. Various Internet-enabled devices that router maker company Securifi says are vulnerable to hacking13. Closeup of Internet-enabled security camera that router maker company Securifi says is vulnerable to hacking. Las Vegas - 4 January 2017 14. SOUNDBITE: (English) Jonathan Roubini, technology analyst: \"So people have to be aware whenever they purchase any products, they have to make sure they purchase products that are secure and they don't have any access to the Internet to anybody they don't want.'' 15. Various of First Alert Onelink smoke and carbon monoxide detectors16. SOUNDBITE: (English) Tom Russo, VP Marketing, First Alert Onelink: \"Apple's Home Kit came first to mind, because of the encryption. Because of their commitment to security and privacy.'' 17. Close up of graph on tablet 18. Various of Sleep Number's 360 Smartbed19. SOUNDBITE: (English) Sarah Reckard, representative, 360 Smartbed:\"Personal, identifiable information is kept separate from your sleep data. So even if someone found something, it's not even juicy.'' Las Vegas - 5 January 2017 20. Various of smart home devices being demonstrated by Intel and Amazon inside a tiny homeLas Vegas - 4 January 2017 21. SOUNDBITE: (English) Oren Falkowitz, former NSA hacker, co-founder Area 1 Security: \"Hackers only hack things or exploit things where they can achieve some goal. There are very limited goals in hacking light bulbs, as far as I can see.'' Las Vegas - 3 January 2017 22. Various of Gary Shapiro, President and CEO of Consumer Technology Association 23. Close of CES/ Consumer Technology Association logo24. SOUNDBITE: (English) Gary Shapiro, President and CEO, Consumer Technology Association: \"I think there will be a growing consumer trend to demand some level of certification or security and we're looking at that as an industry.'' Las Vegas - 5 January 2017 25. Various of LIDAR system on Blackberry prototype LEADIN: The abundance of smart devices on show at the Consumer Electronic Show (CES) has raised the question: how vulnerable are they to hacking?Companies and designers are having to convince consumers that their products are safe - creating business opportunities for others. STORYLINE:A new autonomous Ford that runs on the software of a smartphone. The new Ford Lincoln MKZ has partnered with Blackberry and for a good reason: their phones have never been hacked. \"The most secure phones on the planet, you know, the phones that had never been hacked,\" explains Thomas Bloor, Global Business Development Manager at Blackberry.\"And we're bringing all the expertise and the skill set from those security people into the automotive space. Obviously as cars get more and more connected, then the threat of hacking becomes more prevalent.'' BlackBerry's QNX software operates the GPS and obstacle sensing LIDAR (Light Detection and Ranging) and other sensors that control the car. Protecting connected cars from hackers is one of the \"growth engines'' for the company, Bloor says. \"QNX is one of the growth engines for the company moving forward and we're investing very heavily in developing a lot of more advanced capabilities in things like autonomous drivers is the car I'm sitting today and virtualization solutions to help reduce costs for automakers, bringing advanced technologies into their cars.\"Many of the products at CES this year are connected devices for the so-called Internet of Things (IoT), which raises concerns about security. Hackers in October were able to launch a cyber attack through unsecured Internet connected devices such as web security cameras. Hackers were able to embed malicious code into the devices to overwhelm and flood an internet firm with junk traffic that disrupted several popular websites and service providers such as Netflix, Twitter and PayPal. \"You know, we're still in the very early stage for smart home. So I think we'll have like 40, 50 devices per home in five years from now. So everything is connected to the Internet so imagine if everyone of them becomes a pawn in like this big army that can be used to attack any service site that you want,\" says Rammohan Malasani, CEO, SecurifiThe company has just released an IoT security feature to stop hackers from gaining control of your smart-home devices. It works with its \"Almond 3\" home router.Companies at CES say security is a top priority, with many using secure cloud networks such as those operated or used by Amazon and Apple. But some security experts, like ex-hacker Oren Falkowitz, now co-founder Area 1 Security, brushes off the concerns. \"Hackers only hack things or exploit things where they can achieve some goal. There are very limited goals in hacking light bulbs, as far as I can see.'' Still, the issue has caught the attention of the Consumer Technology Association, which runs CES. Gary Shapiro, President and CEO, of the Consumer Technology Association, says it's something companies will have to think about in the future - even if just to placate the demands of the consumer.\"I think there will be a growing consumer trend to demand some level of certification or security and we're looking at that as an industry.'' ====Clients are reminded: (i) to check the terms of their licence agreements for use of content outside news programming and that further advice and assistance can be obtained from the AP Archive on: Tel +44 (0) 20 7482 7482 Email: info@aparchive.com. (ii) they should check with the applicable collecting society in their Territory regarding the clearance of any sound recording or performance included within the AP Television News service (iii) they have editorial responsibility for the use of all and any content included within the AP Television News service and for libel, privacy, compliance and third party rights applicable to their Territory.\u003c/span\u003e\n\u003c/div\u003e\n\u003cdiv class='action-container flex justify-between'\u003e\n\u003cbutton aria-expanded='false' aria-label='Read more description' class='rp-full-description' type='button'\u003e\n\u003ci class='fai fa-solid fa-align-left'\u003e\u003c/i\u003e\n\u003cspan id='read_more'\u003eRead More\u003c/span\u003e\n\u003c/button\u003e\n\u003cdiv class='rp-report'\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003cdiv aria-labelledby='resource-details-heading' class='rp-info-section'\u003e\n\u003ch2 class='title' id='resource-details-heading'\u003eResource Details\u003c/h2\u003e\n\u003cdiv class='rp-resource-details clearfix'\u003e\n\u003cdiv class='detail'\u003e\n\u003cdl\u003e\n\u003cdt\u003eCurator Rating\u003c/dt\u003e\n\u003cdd\u003e\u003cspan class=\"star-rating\" aria-label=\"3.5 out of 5 stars\" role=\"img\"\u003e\u003ci class=\"fa-solid fa-star text-action\" aria-hidden=\"true\"\u003e\u003c/i\u003e\u003ci class=\"fa-solid fa-star text-action\" aria-hidden=\"true\"\u003e\u003c/i\u003e\u003ci class=\"fa-solid fa-star text-action\" aria-hidden=\"true\"\u003e\u003c/i\u003e\u003ci class=\"fa-solid fa-star-half-stroke text-action\" aria-hidden=\"true\"\u003e\u003c/i\u003e\u003ci class=\"fa-regular fa-star text-action\" aria-hidden=\"true\"\u003e\u003c/i\u003e\u003c/span\u003e\u003c/dd\u003e\n\u003c/dl\u003e\n\u003c/div\u003e\n\u003cdiv class='detail'\u003e\n\u003cdl\u003e\n\u003cdt class=\"educator-rating-title\"\u003eEducator Rating\u003c/dt\u003e\u003cdd\u003e\u003cdiv class=\"educator-rating-details\" data-path=\"/educator_ratings/rrp_data?resourceable_id=342168\u0026amp;resourceable_type=Boclips%3A%3AVideoMetadata\"\u003e\u003cspan class=\"not-yet-rated\"\u003eNot yet Rated\u003c/span\u003e\u003c/div\u003e\u003c/dd\u003e\n\u003c/dl\u003e\n\u003c/div\u003e\n\u003cdiv class='detail'\u003e\n\u003cdl\u003e\n\u003cdt\u003eGrade\u003c/dt\u003e\u003cdd title=\"Grade\"\u003eHigher Ed\u003c/dd\u003e\n\u003c/dl\u003e\n\u003c/div\u003e\n\u003cdiv class='detail'\u003e\n\u003cdl\u003e\n\u003cdt\u003eSubjects\u003c/dt\u003e\u003cdd\u003e\u003cspan\u003e\u003ca href=\"/search?grade_ids%5B%5D=259\u0026amp;search_tab_id=1\u0026amp;subject_ids%5B%5D=1216220\"\u003eAll Subjects\u003c/a\u003e\u003c/span\u003e\u003c/dd\u003e\n\u003c/dl\u003e\n\u003c/div\u003e\n\u003cdiv class='detail'\u003e\n\u003cdl\u003e\n\u003cdt\u003eMedia Type\u003c/dt\u003e\u003cdd\u003e\u003cspan\u003e\u003ca href=\"/search?grade_ids%5B%5D=259\u0026amp;search_tab_id=2\u0026amp;type_ids%5B%5D=4543650\"\u003eNews Clips\u003c/a\u003e\u003c/span\u003e\u003c/dd\u003e\n\u003c/dl\u003e\n\u003c/div\u003e\n\u003cdiv class='detail'\u003e\n\u003cdl\u003e\n\u003cdt\u003eSource:\u003c/dt\u003e\n\u003cdd\u003e\u003c/dd\u003e\n\u003c/dl\u003e\n\u003c/div\u003e\n\u003cdiv class='detail'\u003e\n\u003cdl\u003e\n\u003cdt\u003eDate\u003c/dt\u003e\n\u003cdd\u003e2017\u003c/dd\u003e\n\u003c/dl\u003e\n\u003c/div\u003e\n\u003cdiv class='detail'\u003e\n\u003cdl\u003e\n\u003ci aria-hidden='true' class='fai fa-solid fa-language'\u003e\u003c/i\u003e\n\n\u003c/dl\u003e\n\u003c/div\u003e\n\u003cdiv class='detail'\u003e\n\u003cdl\u003e\n\u003cdt\u003eAudiences\u003c/dt\u003e\u003cdd\u003e\u003cspan\u003e\u003ca href=\"/search?audience_ids%5B%5D=371079\u0026amp;grade_ids%5B%5D=259\u0026amp;search_tab_id=1\"\u003eFor Teacher Use\u003c/a\u003e\u003c/span\u003e\u003c/dd\u003e\u003cdd class=\"text-muted\"\u003e\u003ci class=\"fa-solid fa-lock mr5\"\u003e\u003c/i\u003e2 more...\u003c/dd\u003e\n\u003c/dl\u003e\n\u003c/div\u003e\n\u003cdiv class='detail'\u003e\n\u003cdl\u003e\n\n\u003c/dl\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003cdiv aria-labelledby='concepts-heading' class='rp-info-section'\u003e\n\u003ch2 class='title' id='concepts-heading'\u003eConcepts\u003c/h2\u003e\n\u003cdiv class='clearfix'\u003e\n\u003cdiv class='details-list concepts' data-identifier='Boclips::VideoDecorator' data-type='concepts'\u003ecommunication technology, medical technology, business, cars, products\u003c/div\u003e\n\u003cdiv class='concepts-toggle-buttons' data-identifier='Boclips::VideoDecorator'\u003e\n\u003cbutton aria-expanded='false' class='more btn-link' type='button'\u003e\n\u003cspan\u003eShow More\u003c/span\u003e\n\u003ci aria-hidden='true' class='fa-solid fa-caret-down ml5'\u003e\u003c/i\u003e\n\u003c/button\u003e\n\u003cbutton aria-expanded='true' class='less btn-link' style='display: none;' type='button'\u003e\n\u003cspan\u003eShow Less\u003c/span\u003e\n\u003ci aria-hidden='true' class='fa-solid fa-caret-up ml5'\u003e\u003c/i\u003e\n\u003c/button\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003cdiv aria-labelledby='additional-tags-heading' class='rp-info-section'\u003e\n\u003ch2 class='title' id='additional-tags-heading'\u003eAdditional Tags\u003c/h2\u003e\n\u003cdiv class='clearfix'\u003e\n\u003cdiv class='details-list keyterms' data-identifier='Boclips::VideoDecorator' data-type='keyterms'\u003econsumer electronics manufacturing, turn, year, application software, bringing, corporate news, thermostat, purchase, products and services, 5 degrees, make, lights, consumer product manufacturing, phones, computing and information technology, rest, people, industrial technology, internet technology, smart, computer and data security, household technology, goal, research car, hacking, connected, hack, person, smartphones, home, house, consumer electronics, driverless cars, mobile communication technology, health, internet, back, switch, mobile software, technology issues, security, software, new products and services, mobile phones, early, automotive technology, consumer products and services, secure, internet access\u003c/div\u003e\n\u003cdiv class='keyterms-toggle-buttons' data-identifier='Boclips::VideoDecorator'\u003e\n\u003cbutton aria-expanded='false' class='more btn-link' type='button'\u003e\n\u003cspan\u003eShow More\u003c/span\u003e\n\u003ci aria-hidden='true' class='fa-solid fa-caret-down ml5'\u003e\u003c/i\u003e\n\u003c/button\u003e\n\u003cbutton aria-expanded='true' class='less btn-link' style='display: none;' type='button'\u003e\n\u003cspan\u003eShow Less\u003c/span\u003e\n\u003ci aria-hidden='true' class='fa-solid fa-caret-up ml5'\u003e\u003c/i\u003e\n\u003c/button\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003cdiv aria-labelledby='educator-ratings-heading' class='rp-info-section'\u003e\n\u003ch2 class='title sr-only' id='educator-ratings-heading'\u003eEducator Ratings\u003c/h2\u003e\n\u003cdiv id=\"educator-ratings-root\"\u003e\u003c/div\u003e\u003cdiv id=\"all-educator-ratings-root\"\u003e\u003c/div\u003e\u003cdiv id=\"educator-rating-form-root\"\u003e\u003c/div\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003cdiv class='rp-resource'\u003e\n\u003cdiv aria-label='Show resource details' class='rp-show-info' role='button' tabindex='0'\u003e\n\u003ci class='fai fa-solid fa-align-left'\u003e\u003c/i\u003e\nShow resource details\n\u003c/div\u003e\n\u003cdiv aria-label='Video player' class='player' id='player-wrapper' role='region'\u003e\n\u003cdiv class='relative container mx-auto' id='lp-boclips-visitor-thumbnail'\u003e\n\u003ca class=\"block\" data-html=\"true\" data-placement=\"bottom\" data-trigger=\"click\" data-content=\"\u003cdiv class=\u0026quot;text-center py-2\u0026quot;\u003e\u003ca class=\u0026quot;bold\u0026quot; href=\u0026quot;/auth/users/sign_in\u0026quot;\u003eSign in\u003c/a\u003e or \u003ca class=\u0026quot;bold text-danger\u0026quot; data-posthog-event=\u0026quot;Signup: LP Signup Activity\u0026quot; data-posthog-location=\u0026quot;body_link_boclips\u0026quot; data-remote=\u0026quot;true\u0026quot; href=\u0026quot;/subscription/new\u0026quot;\u003eJoin Now\u003c/a\u003e\u003c/div\u003e\" data-title=\"Get Full Access\" data-container=\"body\" rel=\"popover\" tabindex=\"0\" aria-label=\"Play video: Cyber security in smart devices: how big is the threat?\" href=\"/subscription/new\"\u003e\u003cimg class=\"resource-img img-thumbnail img-responsive z-10 lp-boclips-thumbnail w-full h-full lozad\" alt=\"Cyber security in smart devices: how big is the threat?\" title=\"Cyber security in smart devices: how big is the threat?\" onError=\"handleImageNotLoadedError(this)\" data-default-image=\"https://static.lp.lexp.cloud/images/attachment_defaults/resource/large/missing.png\" data-src=\"https://static.lp.lexp.cloud/images/attachment_defaults/resource/large/missing.png\" width=\"315\" height=\"220\" src=\"data:image/png;base64,R0lGODlhAQABAAD/ACwAAAAAAQABAAACADs\" /\u003e\n\u003cspan aria-hidden='true' class='flex justify-center items-center bg-white rounded-full w-16 h-16 absolute top-1/2 left-1/2 -mt-8 -ml-8 cursor-pointer z-0 border-2 border-primary drop-shadow-md lp-boclips-thumbnail-playBtn'\u003e\n\u003ci class='fa-solid fa-play text-primary text-3xl ml-1 drop-shadow-xl'\u003e\u003c/i\u003e\n\u003c/span\u003e\n\u003c/a\u003e\u003c/div\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n"}