Select an Account to Sign In

Text & Email | Appointment Scheduling | Customer Database

Sign In

MyDex Account

Pay Bills | View Reporting | Manage Your Listings

Sign In
Share: Share to Facebook Share to Twitter Share to LinkedIn

Appliances with Internet Access Vulnerable to Cyber Attacks

By | 01.23.14
Appliances with Internet Access Vulnerable to Cyber Attacks

According to security company Proofpoint, 750,000 phishing and spam emails were reported from December 23 to January 6. That may not seem out of the ordinary to most until you consider the means by which they were sent.

In the first documented case of its kind, Proofpoint claims that 25 percent of the emails were sent by hacking into non-traditional devices including routers, smart TVs and at least one smart refrigerator.

In their report, Proofpoint explains that these new Internet-enabled appliances, unlike more conventional devices like laptops and desktops, are not usually protected by typical anti-spam and anti-virus software.

The report also states that most small businesses don’t employ dedicated IT staff to handle new security breaches involving these types of devices. But, they recommend companies quickly put the same security measures in place for such devices as they anticipate their numbers to increase to four times the amount of laptops, desktops and mobile devices over the next several years.


Sophy, Joshua. “Appliances Now Can Be Used to Hack Your Business”. 1/21/2014.

Share: Share to Facebook Share to Twitter Share to LinkedIn

Like what you see?
get more free content.

Next Up In News


You could waste hours browsing the Web for local business news, and we know you don’t have the time. But, we...

Read More

Are you ready for National Small Business Week?

According to the U.S. Small Business Administration (SBA), April 30 – May 6, 2017 is National Small Business Week...

Read More

Top News Stories and Trends in Local Business 3/27

Who’s got the time anymore to troll news sites for the latest trends and news in local business news?...

Read More

Explore the Blog