Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The LG Rolling Bot Can Patrol Your Home or Office [VIDEO]

b2ap3_thumbnail_lg_rolling_bot_400.jpgConsumer technology continues to grow more versatile and connected, allowing users to perform functions previously unheard of. One such piece of consumer tech is the latest in rolling security bots, the LG Rolling Bot. Basically, what you see is what you get; it’s a rolling security robot that can be controlled remotely through a smartphone.

The LG Rolling Bot can handle many small tasks with relative ease. The Bot connects to your home or office WiFi connection, and it’s controlled via a smartphone app. The Rolling Bot is equipped with a camera that lets you see what it sees on your smartphone screen, and the Bot’s microphone lets you listen to what’s going on at home through your phone’s speakers. You can also speak through the device if you’d like, allowing you to broadcast your voice through the Bot into the room it’s in. Furthermore, the LG Rolling Bot can connect to and interact with other smart home appliances via Bluetooth. In some instances, this can work to your advantage, such as for turning off appliances or other devices that you accidentally left operational, or turning up the heat before you head home.

Another feature that you might find fun with the LG Rolling Bot is the built-in laser pointer. While this might seem like a relatively useless feature, just think of how much fun it would be to mess with your pets while you’re not home. By wirelessly monitoring your cat, dog, goldfish, or other pet, you can help keep them entertained, even while you’re not there. Using the voiceover feature can let you communicate with them even when you’re not there, which might be fun for you, but confusing for them.

You can see the LG Rolling Bot in action in this video from DigitalTrends:

Granted, if you do choose to use this device, there’s always the issue of security. Many Internet of Things devices run into the same problem. Since you’re using your home or office WiFi connection, there’s always the possibility that your LG Rolling Bot could be hacked or infected with viruses or malware. If this happens, hackers might be able to commandeer your camera and spy on you through the device. Having a toy like this get hacked might seem like it holds little consequence, but considering how it has a camera, speaker, microphone, and can control Bluetooth-enabled devices, it could be more dangerous and unsettling than you might think.

Or, worse yet, what would happen if a hacker were to take control of your device? If this happens, they could perform any of the features that you would be able to. There’s a precedent set for this type of hacking activity; there are horror stories of devices like baby monitors, garage doors, and even Internet-connected vehicles being hacked. In general, however, the Internet of Things devices most likely to get hacked are the ones of very little consequence. This doesn’t mean that you shouldn’t take precautions when working with web-connected devices, though.

Can you think of some less conventional ways you could use the LG Rolling Bot? Let us know in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 03 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Google Business Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications IT Support Business Continuity Smartphones Communication Miscellaneous Smartphone Mobile Device Small Business Network Browser Collaboration Productivity Quick Tips Cybersecurity Users Business Management Managed IT Services Windows Upgrade Phishing Outsourced IT Ransomware Data Backup Windows 10 Data Recovery Office Server Save Money Cloud Computing Windows 10 Passwords Virtualization Social Media Saving Money Holiday Gadgets Tech Term Chrome Automation Managed IT Services Managed Service Microsoft Office Computers Cybercrime Artificial Intelligence Operating System Facebook Health BYOD Mobile Device Management Internet of Things Networking IT Support Wi-Fi Hacking Information Technology Remote Information Spam Alert Managed Service Provider Office 365 Covid-19 Telephone Systems Employer-Employee Relationship Recovery Router BDR Bandwidth Social Engineering Mobility Encryption Applications Data Breach Mobile Computing Human Resources Application Law Enforcement Remote Monitoring Big Data Password Money App History VPN Blockchain Government Paperless Office Remote Computing Private Cloud Mobile Office How To Managed IT Apps Data Storage Office Tips Patch Management Training Windows 7 Flexibility Word Gmail Marketing Google Drive WiFi Settings Servers IT solutions Entertainment Website Budget Two-factor Authentication Avoiding Downtime Data Security Mouse HaaS Infrastructure Voice over Internet Protocol Bring Your Own Device Data Management Work/Life Balance Wireless Vulnerability Education Physical Security Scam Lithium-ion battery Safety Sports HIPAA Redundancy Vendor Management Firewall Keyboard USB Telephone System Staff Software as a Service Virtual Reality Apple Machine Learning Connectivity Remote Work Social Vendor User Error Save Time Meetings Managed Services Display Cleaning Risk Management Hacker Employee/Employer Relationship Conferencing Data Protection RMM End of Support The Internet of Things Computer Accessories SharePoint Comparison Worker Internet Exlporer Audit IT Management CES Customer Service PDF Digital Signage Botnet IT Plan Content Management Environment Business Technology Printer Access Control Fax Server Bluetooth Proactive IT Unsupported Software Virtual Assistant Best Practice Authentication Procurement Charger Net Neutrality YouTube SaaS Workplace Strategy Black Market Help Desk Compliance IT Consultant Printing Computer Care OneNote Network Congestion Current Events Update Telephony eWaste Document Management Solid State Drive Samsung Humor Wireless Technology How to Google Docs Managed Services Provider Downtime Identity Theft Value Database Data storage Electronic Medical Records Wearable Technology Automobile Spam Blocking Remote Workers Retail Hard Drives Augmented Reality Instant Messaging Processor Computing Infrastructure Hiring/Firing Excel Fraud Robot Going Green Remote Worker Biometrics Hard Drive Virtual Desktop Cryptocurrency Battery Virus Computing Shadow IT DDoS Business Intelligence Legal Unified Threat Management GDPR Hosted Computing PCI DSS Virtual Machine Customer Relationship Management Managing Stress Fiber Optics Advertising Employee Wireless Internet Distributed Denial of Service 2FA Politics Online Shopping Messaging Public Computer Analyitcs Cabling File Sharing Cameras Notifications Camera Regulations Inventory Policy Specifications Programming Hypervisor Transportation Trend Micro Rootkit Wire Dark mode Computer Fan Evernote SMS Travel Default App Printers Antivirus Procedure Workers Millennials Saving Time Relocation Benefits Shopping Windows 8 Google Search Smart Office dark theme FENG Wireless Charging IT service AI Video Games IBM IT Infrastructure Printer Server Bing Virtual Private Network Flash FinTech Worker Commute Workforce Smart Technology Social Network Tablet Experience Cables Software Tips Domains Scalability Supercomputer Investment Project Management Sync Nanotechnology Employees Business Owner Emails Telecommuting Employee/Employer Relationships Cortana Maintenance ISP NarrowBand IaaS Windows 365 Digital Signature Video Conferencing Search Bloatware ROI Shortcuts Warranty Sales Netflix Bitcoin iPhone Two Factor Authentication Root Cause Analysis Google Apps Personal Tablets Cryptomining HVAC Point of Sale HBO Analysis Supply Chain Management Knowledge Entrepreneur Music Files Administrator Skype Devices Monitoring Batteries Data loss Shortcut Digitize Chromecast Enterprise Content Management Windows 8.1 MSP Outlook Accountants Leadership Cost Management Consultant Windows Server 2008 R2 Troubleshooting Colocation Analytics Uninterrupted Power Supply Microchip Start Menu Thought Leadership Customer relationships Credit Cards Social Networking Screen Mirroring Password Manager IT Assessment Loyalty Manufacturing Password Management Email Best Practices Frequently Asked Questions Multi-Factor Security Best Available Monitor Books Security Cameras Search Engine Mobile Twitter Running Cable Computer Tips Windows 10s WIndows 7 Managed IT Service Virtual CIO Cast Business Mangement OneDrive Memory Biometric Security NIST Streaming Media Tip of the week Smart Tech Peripheral webinar Trending Reputation Emergency Using Data Employer Employee Relationship Tech Support Professional Services Addiction Digital Security Cameras Content Public Cloud Amazon Recycling Copiers Techology Assessment 5G Laptop Wiring Windows Server 2008 Practices Quick Tip Customers User Science PowerPoint Smartwatch Windows Media Player Tools Cache Ergonomics Audiobook Amazon Web Services Criminal Development Television OLED Touchpad Safe Mode

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code