The Dojo is due out in April for $199 Credit: Thinkstock BARCELONA — Homeowners worried about cybersecurity attacks on IP-connected devices like lights, baby monitors, home security systems and cameras, will soon be able to take advantage of a $200 network monitoring device called Dojo.The device was shown at Mobile World Congress here this week and will go on sale online in April. While the Dojo device isn’t intended to provide enterprise-level security, it could be used to help, in a small way, in warding off massive attacks like the one that used the Mirai botnet which took advantage of unsecure, consumer-grade cameras and other devices last October.Yossi Atias, co-founder and CEO of Dojo-Labs, now a part of U.K.-based security provider BullGuard, said it will be the first product of its kind to hit the market, although security software companies Norton and McAfee are expected to offer competitive consumer products later this year.The Dojo hardware connects with a cable to a home’s Wi-Fi router to intercept IP packets and block real-time cyberattacks. It uses artificial intelligence to customize a security policy for each device on the network, the company said. Atias demonstrated how the device connects to a smartphone app and alerts a homeowner when an attack on a device occurs. Settings allow a user to block the online attack remotely.The device can also prevent privacy issues by alerting a homeowner if a television or a child’s toy or other object could be monitoring conversations that companies want to use for marketing purposes, Atios said. Nearly two years ago, it was discovered that Samsung TVs could be used to listen to homeowners with a voice command feature. The device runs on a Linux OS. The $199 price includes one year of service. After that, the service costs $10 a month. Related content news Google Chrome zero-day jumps onto CISA's known vulnerability list A serious security flaw in Google Chrome, which was discovered under active exploitation in the wild, is a new addition to the Cybersecurity and Infrastructure Agency’s Known Exploited vulnerabilities catalog. By Jon Gold Oct 03, 2023 3 mins Zero-day vulnerability Vulnerabilities Security brandpost The advantages and risks of large language models in the cloud Understanding the pros and cons of LLMs in the cloud is a step closer to optimized efficiency—but be mindful of security concerns along the way. By Daniel Prizmant, Senior Principal Researcher at Palo Alto Networks Oct 03, 2023 5 mins Cloud Security news Arm patches bugs in Mali GPUs that affect Android phones and Chromebooks The vulnerability with active exploitations allows local non-privileged users to access freed-up memory for staging new attacks. By Shweta Sharma Oct 03, 2023 3 mins Android Security Vulnerabilities news UK businesses face tightening cybersecurity budgets as incidents spike More than a quarter of UK organisations think their cybersecurity budget is inadequate to protect them from growing threats. By Michael Hill Oct 03, 2023 3 mins CSO and CISO Risk Management Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe