Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The LG Rolling Bot Can Patrol Your Home or Office [VIDEO]

b2ap3_thumbnail_lg_rolling_bot_400.jpgConsumer technology continues to grow more versatile and connected, allowing users to perform functions previously unheard of. One such piece of consumer tech is the latest in rolling security bots, the LG Rolling Bot. Basically, what you see is what you get; it’s a rolling security robot that can be controlled remotely through a smartphone.

The LG Rolling Bot can handle many small tasks with relative ease. The Bot connects to your home or office WiFi connection, and it’s controlled via a smartphone app. The Rolling Bot is equipped with a camera that lets you see what it sees on your smartphone screen, and the Bot’s microphone lets you listen to what’s going on at home through your phone’s speakers. You can also speak through the device if you’d like, allowing you to broadcast your voice through the Bot into the room it’s in. Furthermore, the LG Rolling Bot can connect to and interact with other smart home appliances via Bluetooth. In some instances, this can work to your advantage, such as for turning off appliances or other devices that you accidentally left operational, or turning up the heat before you head home.

Another feature that you might find fun with the LG Rolling Bot is the built-in laser pointer. While this might seem like a relatively useless feature, just think of how much fun it would be to mess with your pets while you’re not home. By wirelessly monitoring your cat, dog, goldfish, or other pet, you can help keep them entertained, even while you’re not there. Using the voiceover feature can let you communicate with them even when you’re not there, which might be fun for you, but confusing for them.

You can see the LG Rolling Bot in action in this video from DigitalTrends:

Granted, if you do choose to use this device, there’s always the issue of security. Many Internet of Things devices run into the same problem. Since you’re using your home or office WiFi connection, there’s always the possibility that your LG Rolling Bot could be hacked or infected with viruses or malware. If this happens, hackers might be able to commandeer your camera and spy on you through the device. Having a toy like this get hacked might seem like it holds little consequence, but considering how it has a camera, speaker, microphone, and can control Bluetooth-enabled devices, it could be more dangerous and unsettling than you might think.

Or, worse yet, what would happen if a hacker were to take control of your device? If this happens, they could perform any of the features that you would be able to. There’s a precedent set for this type of hacking activity; there are horror stories of devices like baby monitors, garage doors, and even Internet-connected vehicles being hacked. In general, however, the Internet of Things devices most likely to get hacked are the ones of very little consequence. This doesn’t mean that you shouldn’t take precautions when working with web-connected devices, though.

Can you think of some less conventional ways you could use the LG Rolling Bot? Let us know in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 02 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Smartphones Communication Business Continuity IT Support Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Users Business Management Managed IT Services Phishing Upgrade Windows Data Backup Outsourced IT Ransomware Windows 10 Data Recovery Office Cloud Computing Server Save Money Passwords Windows 10 Chrome Virtualization Tech Term Social Media Saving Money Holiday Gadgets Microsoft Office Managed Service Automation Managed IT Services Artificial Intelligence Operating System Computers Facebook Cybercrime Wi-Fi Hacking BYOD Mobile Device Management Health Internet of Things Networking IT Support Spam Office 365 Information Telephone Systems Information Technology Remote Alert Covid-19 Managed Service Provider Social Engineering Mobility Router Recovery Employer-Employee Relationship BDR Bandwidth Remote Monitoring Big Data Password Data Breach Money Encryption App History Applications Mobile Computing Application Law Enforcement Human Resources Blockchain Paperless Office Apps Office Tips Training How To VPN Government Private Cloud Data Storage Remote Computing Patch Management Managed IT Mobile Office Bring Your Own Device Data Management Work/Life Balance Servers Flexibility Marketing Wireless Infrastructure WiFi Data Security Voice over Internet Protocol Google Drive IT solutions Entertainment Gmail Website Budget Settings Avoiding Downtime Two-factor Authentication Vulnerability Mouse Windows 7 HaaS Word User Error Employee/Employer Relationship Cleaning Meetings Software as a Service Telephone System RMM Staff Vendor Management Machine Learning Connectivity Remote Work End of Support Risk Management Hacker Education Physical Security Safety The Internet of Things Sports HIPAA Lithium-ion battery Redundancy Keyboard USB Data Protection Firewall Vendor Virtual Reality Managed Services Apple Display Conferencing Save Time Social Scam IT Management Virtual Assistant Hard Drive Authentication Computing Infrastructure Botnet IT Plan Going Green Wearable Technology Computing Retail Hard Drives Virus Instant Messaging Excel Unsupported Software Update Robot Battery Unified Threat Management Computer Accessories Charger Shadow IT Biometrics Google Docs Legal Virtual Desktop Digital Signage Identity Theft Compliance Computer Care Internet Exlporer OneNote Current Events DDoS Telephony PDF Printer Samsung SharePoint Bluetooth Augmented Reality Procurement Net Neutrality Fraud Workplace Strategy Value Proactive IT Help Desk Remote Worker Customer Service Electronic Medical Records Best Practice Printing Environment Spam Blocking YouTube Cryptocurrency IT Consultant Black Market Fax Server Hiring/Firing Managed Services Provider Comparison Humor SaaS Database Document Management Solid State Drive Wireless Technology CES How to Downtime Remote Workers Network Congestion Business Intelligence eWaste Business Technology Processor Content Management Access Control Data storage Worker Automobile Audit WIndows 7 Public Computer Peripheral Using Data Shortcut Regulations Workforce Monitor Digital Security Cameras Transportation Virtual Private Network Rootkit Copiers 5G Cost Management Cables Computer Fan Quick Tip Social Networking Streaming Media Nanotechnology Smartwatch Telecommuting Workers Reputation Ergonomics Benefits Project Management Tech Support Development OLED Cortana Content FENG User Techology PowerPoint IBM Laptop PCI DSS Running Cable Windows Media Player Virtual Machine Digital Signature Warranty Fiber Optics Employee Memory Flash Customers 2FA Smart Technology Messaging HVAC Cabling Google Apps Audiobook Analysis Managing Stress Software Tips Supercomputer Touchpad Policy Hypervisor Administrator Trend Micro Devices Sync Emails Dark mode Advertising Cameras SMS Enterprise Content Management Default App Politics Accountants Science Procedure MSP Saving Time Microchip Notifications Shopping Thought Leadership Google Search Credit Cards Netflix dark theme Two Factor Authentication Root Cause Analysis AI Password Management IT Infrastructure Password Manager Bing HBO Multi-Factor Security Knowledge FinTech Distributed Denial of Service Music Customer Relationship Management Search Engine Social Network Twitter Analyitcs Skype Relocation Data loss Printer Server NIST Investment Programming Business Mangement Smart Tech Outlook Trending Video Games Leadership Employees Troubleshooting Employee/Employer Relationships Addiction ISP Start Menu Amazon Worker Commute Windows 365 Screen Mirroring Loyalty Video Conferencing Antivirus ROI Recycling Experience Practices Shortcuts Windows 8 Frequently Asked Questions Scalability Sales Books Wiring Bitcoin Personal IT service Cache Cryptomining Mobile Amazon Web Services Business Owner Windows 10s Point of Sale Cast NarrowBand Supply Chain Management Safe Mode Criminal Hosted Computing Tablet Tip of the week Search webinar Monitoring Emergency GDPR Batteries Employer Employee Relationship Digitize Domains Wireless Internet Professional Services Online Shopping Public Cloud iPhone Windows 8.1 Assessment File Sharing Windows Server 2008 R2 Maintenance Inventory Windows Server 2008 Specifications Customer relationships IaaS Camera IT Assessment Wire Manufacturing Bloatware Tools Evernote Consultant Files Email Best Practices Travel Analytics Television Chromecast Security Cameras Tablets Millennials Computer Tips Printers Managed IT Service Colocation Virtual CIO Uninterrupted Power Supply OneDrive Smart Office Biometric Security Entrepreneur Wireless Charging Best Available

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code