Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The LG Rolling Bot Can Patrol Your Home or Office [VIDEO]

b2ap3_thumbnail_lg_rolling_bot_400.jpgConsumer technology continues to grow more versatile and connected, allowing users to perform functions previously unheard of. One such piece of consumer tech is the latest in rolling security bots, the LG Rolling Bot. Basically, what you see is what you get; it’s a rolling security robot that can be controlled remotely through a smartphone.

The LG Rolling Bot can handle many small tasks with relative ease. The Bot connects to your home or office WiFi connection, and it’s controlled via a smartphone app. The Rolling Bot is equipped with a camera that lets you see what it sees on your smartphone screen, and the Bot’s microphone lets you listen to what’s going on at home through your phone’s speakers. You can also speak through the device if you’d like, allowing you to broadcast your voice through the Bot into the room it’s in. Furthermore, the LG Rolling Bot can connect to and interact with other smart home appliances via Bluetooth. In some instances, this can work to your advantage, such as for turning off appliances or other devices that you accidentally left operational, or turning up the heat before you head home.

Another feature that you might find fun with the LG Rolling Bot is the built-in laser pointer. While this might seem like a relatively useless feature, just think of how much fun it would be to mess with your pets while you’re not home. By wirelessly monitoring your cat, dog, goldfish, or other pet, you can help keep them entertained, even while you’re not there. Using the voiceover feature can let you communicate with them even when you’re not there, which might be fun for you, but confusing for them.

You can see the LG Rolling Bot in action in this video from DigitalTrends:

Granted, if you do choose to use this device, there’s always the issue of security. Many Internet of Things devices run into the same problem. Since you’re using your home or office WiFi connection, there’s always the possibility that your LG Rolling Bot could be hacked or infected with viruses or malware. If this happens, hackers might be able to commandeer your camera and spy on you through the device. Having a toy like this get hacked might seem like it holds little consequence, but considering how it has a camera, speaker, microphone, and can control Bluetooth-enabled devices, it could be more dangerous and unsettling than you might think.

Or, worse yet, what would happen if a hacker were to take control of your device? If this happens, they could perform any of the features that you would be able to. There’s a precedent set for this type of hacking activity; there are horror stories of devices like baby monitors, garage doors, and even Internet-connected vehicles being hacked. In general, however, the Internet of Things devices most likely to get hacked are the ones of very little consequence. This doesn’t mean that you shouldn’t take precautions when working with web-connected devices, though.

Can you think of some less conventional ways you could use the LG Rolling Bot? Let us know in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 24 January 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Google Business Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications IT Support Smartphones Communication Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Quick Tips Cybersecurity Users Business Management Upgrade Phishing Windows Managed IT Services Ransomware Data Backup Outsourced IT Windows 10 Server Save Money Cloud Computing Office Data Recovery Passwords Windows 10 Chrome Tech Term Gadgets Virtualization Saving Money Holiday Social Media Managed Service Managed IT Services Microsoft Office Automation Cybercrime Operating System Artificial Intelligence Computers Facebook IT Support Health Hacking Internet of Things Wi-Fi BYOD Mobile Device Management Networking Information Managed Service Provider Spam Alert Office 365 Remote Telephone Systems Information Technology Covid-19 Recovery Employer-Employee Relationship Router BDR Social Engineering Mobility Bandwidth Human Resources Big Data Law Enforcement Remote Monitoring Data Breach Password Mobile Computing Money App History Application Encryption Applications How To Government Remote Computing Private Cloud Data Storage Mobile Office Patch Management Managed IT Apps Office Tips Training Blockchain VPN Paperless Office Two-factor Authentication Avoiding Downtime Infrastructure Voice over Internet Protocol Mouse HaaS Vulnerability Windows 7 Flexibility Word Bring Your Own Device Marketing Data Management WiFi Work/Life Balance Servers IT solutions Entertainment Website Wireless Budget Gmail Data Security Google Drive Settings Machine Learning Firewall Keyboard Connectivity Employee/Employer Relationship Remote Work RMM Virtual Reality Apple Social Conferencing User Error Save Time Meetings Scam Data Protection Cleaning Risk Management Hacker Vendor Management USB End of Support The Internet of Things Education Vendor Physical Security Lithium-ion battery Safety Managed Services Display Sports HIPAA Staff Software as a Service Redundancy Telephone System Fax Server Proactive IT Value Hard Drive Update Best Practice Spam Blocking Electronic Medical Records YouTube SaaS Google Docs Black Market Computing Hiring/Firing Identity Theft Network Congestion eWaste Document Management Solid State Drive Wireless Technology Augmented Reality Virus How to Downtime Digital Signage Fraud Business Intelligence Unified Threat Management Remote Worker Computer Accessories Data storage Audit Wearable Technology Automobile Worker Retail Hard Drives IT Management Cryptocurrency Procurement Instant Messaging Excel Workplace Strategy Botnet Net Neutrality Robot Computing Infrastructure Going Green IT Plan Printer Help Desk Comparison Biometrics Bluetooth Printing Virtual Desktop CES Unsupported Software Battery Shadow IT DDoS Charger Content Management Legal Business Technology Managed Services Provider Access Control SharePoint Compliance Internet Exlporer IT Consultant OneNote Database Computer Care Current Events Virtual Assistant Telephony Remote Workers Authentication Humor Samsung Customer Service PDF Processor Environment Computer Tips Skype Project Management Managed IT Service Nanotechnology Antivirus Security Cameras Telecommuting Relocation Windows 8 Virtual CIO OneDrive Data loss Biometric Security Cortana Leadership Digital Signature IT service Video Games Troubleshooting Consultant Peripheral Outlook Digital Security Cameras Start Menu Warranty Analytics Using Data Worker Commute Tablet Copiers Screen Mirroring HVAC Experience 5G Loyalty Google Apps Analysis Domains Scalability Books Best Available Quick Tip Frequently Asked Questions WIndows 7 Ergonomics Mobile Administrator Windows 10s Devices Business Owner Smartwatch Maintenance NarrowBand Development Cast Enterprise Content Management IaaS OLED Tip of the week MSP Virtual Machine webinar Accountants Search Emergency Bloatware PCI DSS 2FA Professional Services Microchip Fiber Optics Public Cloud Thought Leadership Employee Employer Employee Relationship Credit Cards iPhone Assessment Password Manager Tablets Messaging Password Management Cabling Windows Server 2008 Hypervisor Multi-Factor Security Entrepreneur Policy User Dark mode Tools Search Engine PowerPoint Trend Micro Twitter Windows Media Player Files Television Business Mangement Shortcut Chromecast SMS NIST Default App Saving Time Smart Tech Trending Cost Management Procedure Uninterrupted Power Supply Managing Stress dark theme Shopping Addiction Google Search Amazon Social Networking Colocation Public Computer Recycling AI IT Infrastructure Regulations Wiring Cameras Practices Bing Transportation Monitor FinTech Social Network Computer Fan Cache Running Cable Rootkit Amazon Web Services Criminal Memory Safe Mode Investment GDPR Employee/Employer Relationships Workers Hosted Computing Benefits Reputation Streaming Media Employees Tech Support Windows 365 FENG Wireless Internet Content ISP Online Shopping IBM Techology Laptop Video Conferencing File Sharing ROI Flash Camera Printer Server Bitcoin Inventory Shortcuts Smart Technology Specifications Customers Sales Science Point of Sale Personal Wire Audiobook Cryptomining Evernote Supercomputer Travel Touchpad Supply Chain Management Software Tips Sync Printers Batteries Emails Millennials Monitoring Windows 8.1 Digitize Smart Office Distributed Denial of Service Politics Wireless Charging Customer Relationship Management Advertising Analyitcs Windows Server 2008 R2 Customer relationships Virtual Private Network Netflix Two Factor Authentication Workforce Programming Notifications Email Best Practices IT Assessment Root Cause Analysis Manufacturing Cables Knowledge Music HBO

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code