8 Things in Your Home That Could Be Spying on You
With more and more items connecting to the Internet, it’s easier than ever for hackers to gain access.
In 2014, the FBI and other countries’ law enforcement teams busted more than a dozen hackers for using Blackshades software, which could, among other things, activate laptop cameras to spy on the victims. The program infected half a million computers, and at least one hacker blackmailed his victims—notably, 2013’s Teen Miss USA Cassidy Wolf—by threatening to publicize video he’d taken without their knowledge. Find out the effective way you can stop hackers from spying through your laptop. And once you’re done using your laptop here’s what to do with it.
Security research firm ReVuln found a vulnerability in Samsung Smart TVs in 2012 that could open the door for hackers to access files on connected USBs, plus get total control to see and adjust settings on the TV itself. Given that Samsung’s TVs paired video face recognition with audio recordings, security experts feared the TVs—and hackers—could record families when they didn’t intend. And it wasn’t just whistleblowers. In 2017, files published on Wikileaks alleged that the CIA and its British counterpart MI5 developed malware called Weeping Angel that could record audio when the TV appeared to be off, and the team was trying to add video to its capabilities. It doesn’t mean the government is spying on innocent binge watchers, but the implications of vulnerable TVs are disconcerting. Here’s how to buy and install the best wi-fi security camera for your needs.
Android owners can ask their virtual assistant questions—and Google holds on to those questions. Your Google account includes a list of all the requests (no matter how embarrassing) you’ve made and archives them in your audio history, along with a text version of what you said. Those might be slightly awkward to read through—and luckily, delete—but you might also find some recordings you didn’t know you were making. An investigation from The Sun claims it’s easy for the phones to mistake everyday conversation with the “OK Google” voice-control initiation. If the phone thinks you’ve asked for it to do a search, it will take a ten-minute recording, even if you don’t realize it’s happening. Learn how to keep your cell phone safe from hackers. And learn what to do with your old cell phone.
Voice assistants like Amazon Echo and Google Home are always listening. Always. Their voice activation is triggered with the words “Alexa” and “OK Google,” respectively, but in order to recognize those “wake words,” they need to be listening to everything you said beforehand, too. They won’t send conversations to their servers for storage until you’ve called them to action, and there haven’t been stories of anyone hacking into them when they’re dormant. Still, paranoid users might want to stay away from the voice-activation technologies. You can mute the devices when you know you won’t need them, but keep in mind that doing so makes them essentially useless until you turn the setting back on. Check out these 10 unexpected ways to use your Alexa.
In 2016, a threat intelligence analyst who has diabetes revealed he’d found a way to take control of insulin pumps from half a mile away, then adjust the insulin and potentially kill the victim. The next year, the FDA announced St. Jude Medical’s cardiac devices, including pacemakers and defibrillators, could be hacked. St. Jude initially denied the claims, which first came out in 2016, then patched the vulnerability after the FDA confirmation. No patients were harmed from the St. Jude’s vulnerability, either, but the cases show the importance of creating security measures.
Ironically, a home security camera could be an entryway for hackers to spy on you. A researcher at security company Sophos released a videoshowing a program that could guess a CCTV password in less than a minute, not only sending the video stream to his own computer, but giving him full control over where the camera points. He points out that most people don’t change their passwords, so the hacker can easily keep spying on you. Using a strong password and changing it often can ward off a cyber attack. Here’s how to install safe outdoor surveillance cameras.
Spies might not care about the temperature of your home, but they could have an interest in your HVAC system. Experts blamed the infamous 2013 Target hack on its heating and cooling system. The Internet-connected temperature controls allowed an entry point for hackers who made their way to 40 million shoppers’ debit and credit cards. By 2016, security researchers found a way to hack into web-connected smart thermostats, lock its controls, and leave a ransom note. Check out these 10 reasons to install a smart thermostat.
Refrigerator, Dishwasher, Coffee Machine …
With the so-called Internet of things, countless other everyday objects are connected to the web. The idea is to make life easier—for instance, fridges that keep track of your family schedule and the food you’re out of— but they also open the door to let watchful eyes in. In 2012, then-CIA director David Petraeus discussed the “transformational” potential of hacking into Internet-connected household objects to spy on persons of interest. Next, find out the hiding spots burglars won’t think to look.