Your Web News in One Place

Help Webnuz

Referal links:

Sign up for GreenGeeks web hosting
October 22, 2019 11:30 pm

Japanese Hotel Chain Sorry That Hackers May Have Watched Guests Through Bedside Robots

Japanese hotel chain HIS Group has apologized for ignoring warnings that its in-room robots were hackable to allow pervs to remotely view video footage from the devices. The Register reports: The Henn na Hotel is staffed by robots: guests can be checked in by humanoid or dinosaur reception bots before proceeding to their room. Facial recognition tech will let customers into their room and then a bedside robot will assist with other requirements. However several weeks ago a security researcher revealed on Twitter that he had warned HIS Group in July about the bed-bots being easily accessible, noting they sported "unsigned code" allowing a user to tap an NFC tag to the back of robot's head and allow access via the streaming app of their choice. Having heard nothing, the researcher made the hack public on October 13. The vulnerability allows guests to gain access to cameras and microphones in the robot remotely so they could watch and listen to anyone in the room in the future. The hotel is one of a chain of 10 in Japan which use a variety of robots instead of meat-based staff. So far the reference is only to Tapia robots at one hotel, although it is not clear if the rest of the chain uses different devices. The HIS Group tweeted: "We apologize for any uneasiness caused," according to the Tokyo Reporter. The paper was told that the company had decided the risks of unauthorized access were low, however, the robots have now been updated.

Read more of this story at Slashdot.


Original Link: http://rss.slashdot.org/~r/Slashdot/slashdot/~3/1np4uf6Hzso/japanese-hotel-chain-sorry-that-hackers-may-have-watched-guests-through-bedside-robots

Share this article:    Share on Facebook
View Full Article

Slashdot

Slashdot was originally created in September of 1997 by Rob "CmdrTaco" Malda. Today it is owned by Geeknet, Inc..

More About this Source Visit Slashdot