A HACKER OF THE WORST KIND - Yelling at a baby, really?
1. Most home based technologies - baby monitors, web cams, gaming systems - are not built to keep the bad guys out, they are built for convenience.
2. Any device with video/audio - should NOT be in a bed room or dressing room
3. This one wasn't quiet, but often a hacker can turn on your video/audio and you might not even know it b/c the light isn't on for the camera and the hacker is quiet.
4. What can you do? Keep the equipment up to date with software downloads; consider a piece of masking tape over camera lenses when not in use; lock down your home networks with strong passwords
5. Remember, what makes a technology convenient or "one stop shop" always makes it convenient for a cybercriminal...Many people don't realize that the Video baby monitors can broadcast to TVs, over the WiFi to another digital device, and even to walkie talkies. If you can keep an eye on the baby from anywhere, so can the bad guys.
And now we have to download security updates for our Refrigerators and Toilets? Say it isn't so!
In the rush to automate the home, just about every device in the home comes with a feature that either helps you save money or makes life more convenient
- a thermostat that senses you are home and turns the system on
- light bulbs that turn on 10 minutes before you arrive for safety
- the fridge that keeps track that you really do have eggs, they are just in the back
- and even remotely controlled flushing toilets so you can flush while you stand away from any germs
1. All of these products are designed for ease of use and convenience. The more convenient and new a technology is, we usually find it's convenient and new for the hackers.
2. We can't even stop the hacking of our web browsers and email accounts so what makes us think these devices are going to be more hack proof?
3. Use the devices but proceed with caution. Ask the manufacturer what precautions they have taken to safeguard your privacy and security.
4. If a software update comes out for that device, download it immediately because it may contain important security patches
Are you saying that Google admitted that none of us should expect privacy?
1. In a Federal filing, Google said this:
"Just as a sender of a letter to a business colleague cannot be surprised that the recipient's assistant opens the letter, people who use web-based email today cannot be surprised if their emails are processed by the recipient's [email provider] in the course of delivery.
"Indeed, 'a person has no legitimate expectation of privacy in information he voluntarily turns over to third parties.'"
2. Google, by the way, is in a class action suit over automatic scanning of email.
3. Why is this so bad?
I think most people look at email like the US Post Office - we know the Post Office scans the "from" and "to" lines so that delivery happens and they look at trends to help them run efficiently. But nobody expects the US Post Office to steam open our letters, scan them for key words, seal them shut and then deliver. We're law abiding citizens so we expect a reasonable amount of privacy...Google essentially said they read your letters. Ugh!
4. Can we do anything about this?
Complain. Stop using Gmail. I guess you could have fun with it by talking in crazy codes and lingo to drive Google crazy.
I heard that the Department of Energy was hacked? Is our energy safe?1. The Dept of Energy has been hacked 2x this year, at least these are the ones we know about. They notified employees via an email Wednesday that hackers gained personal info, such as names and social security numbers, of 14,000 current and former agency employees. They had another attack in Feb.
2. Well, that's a shame for those employees but why should the average homeowner be concerned?
The email accounts of Dept of Energy employees is a gold nugget for cybercriminals that want to hack our energy supply. They can learn information from the emails, scan attachments for critical clues, learn more about the systems that are used. In addition, they could employee emails to sneak in a virus. People are most likely to open up emails from their co workers that look legit.