Protecting Baby Monitors From Hackers

With the number of single parent and two-income households increasing, the use of Wi-Fi-capable baby monitors has become indispensable to most. While many monitors are purchased for personal use, when children are left at home with other caretakers, many daycare centers have also shifted to video monitoring for parents’ comfort. Both options allow parents to log in to the monitor via smartphone application or a computer.

An Unsecured Monitor Can Endanger Your Home and Family

The growing number of wireless connections has also the increased the risk of attack by digital predators. The problem is that many users do not think of these devices as working just the same as a computer; they have the false ideal that something as innocent as a baby monitor cannot put their homes and families at risk.

Unfortunately, without proper security, infant monitors can be an open door into your life. If a hacker were to gain access to your baby monitor, particularly one with video capabilities, they could cause physical, financial and emotional harm to your family.

When connected with your monitor, a hacker will have full access to all of the same controls that you do when logged in remotely. This means that if you have a talk-back feature or the ability to pan and zoom the camera, the hacker will as well.

For the burglar, having audio and video access into your home, even if it just in the nursery, will give them a good idea of when to strike.

Identity thieves also like to take advantage of these features, especially if you have cameras set up in multiple areas of your house. They can zoom in on personal documents or look over your shoulder at the computer screen or they can utilize the audio to listen in on personal conversations to get information they want.

While the thought of these criminals having access to your family is enough to instill in you a sense of wariness, arguably the most unsettling type of criminal who is interested in your baby monitor is the voyeur. They will either sit in silence and watch, without you ever knowing, or they may like to taunt and haunt, speaking out to you or your child.

Regardless of the motives behind a monitor breach, the truth is you do not want anyone ‒ even your next-door neighbor ‒ to have access to the goings-on within your home and precautions need to be taken in order to secure your monitor and network.

Secure Your Monitor

The first step is to conduct research into the monitors on the market. Know what features make certain devices more secure and know which companies are reputable. Be aware of the ins and outs of your monitor so that you can be quick to respond should it be hacked.

FHSS Technology

There are two types of spread spectrum radio: direct-sequence spread spectrum (DSSS) and   frequency-hopping spread spectrum (FHSS). While both have their benefits when it comes to security, the most secure baby monitors employ FHSS, if not simply based on lower overhead cost.

What does this mean?

If you grew up in the days when kids didn’t have cell phones and walkie-talkies were the best means of moderate-range communication, you will remember how easy it was for someone outside of your group to end up on the same channel (or frequency) you were using.

The same thing can happen to baby monitors, particularly the ones that are not connected via wireless. FHSS helps to prevent this from happening. It limits outside access by randomly hopping frequencies at an incredible rate (the Federal Communications Commission requires that devices spread over 75 frequencies within a period of 400 milliseconds), making it harder to establish a connection.

Analog vs. Digital

The terms digital and analog do not only apply to baby monitors; they are two types of signals that are transmitted to electronic devices. The main difference is that analog is “translated into electric pulses of varying amplitude” and digital is in “binary format”.

What does this mean for your baby monitor?

If the thought of a baby monitor brings to mind muffled sound over a steady stream of static, you are thinking of an analog monitor. While many analog models are becoming more and more obsolete as parents opt for the video and wireless models, they can still be a popular choice for the budget-conscious parent.

Irritating background noise is not all that analog monitors are known for. Their connection range is notoriously short and they are highly prone to inference from other analog devices, such as taxi and truck radios.

Digital monitors’ stronger signal and binary coding makes for a more secure monitor. That is not to say digital monitors are impervious to hacking or interference – digital devices such as cell phones and routers can disrupt the signal – but rather that they are a better choice over analog in terms of security.

Update Software Regularly

How often do you see notifications for updates on your computer or smartphone? How often do you actually conduct them? While few updates come with new features and the number of updates you are prompted for may seem daunting and irritating, keeping your software up to date is crucial when it comes to security.

Hackers are smart and quick; as soon as new software is available for an electronic device, they are at work trying to pull it apart and get into it. All of those updates that you see pop up can help to slow them down, keeping your device safe with the latest protection and software.

When using a baby monitor that is connected via wireless, make sure you are aware of how it needs to be updated. If you access it through a web page, it will likely automatically be updated, whereas if you access it via mobile app, you may need to install them manually.

Secure Your Network

Over the years, manufacturers have made numerous changes to the components of baby monitors in order to make them more secure for families. However, even with all of these changes, there are still potential risks when using these monitors while connected to the internet, particularly if there have been no measures taken to secure your network.

Customized Network ID and Password

The first step to improving the security of your wireless local area network (WLAN) is to change the preset service set identifier (SSID). This is essentially the name of your wireless network. Every router and hotspot has one that is already set by the manufacturer and by leaving it as the default, you can leave yourself vulnerable to cyberattacks.

Routers manufactured by the same company may repeat SSIDs on their units. This means that your router has the potential to match the name of several others. Hackers have ways of finding these names and if your router’s SSID is on their list, they can gain access to it. Creating a custom name minimizes this risk.

You can also lock down your SSID by disabling SSID broadcasting, which will hide your Wi-Fi network. This will mean that anyone who wants to access your network will have to know the SSID first (meaning they will not be able to find it in the list of available networks when trying to connect to the internet).

In addition to changing your SSID, you will also want to change your password. Many wireless router companies will use stock passwords and just like SSIDs, these passwords may repeat ‒ giving hackers a good idea of what to use to access your network.

Customize your password and make it secure. This means using a “passphrase” that is at least 12 characters with a mixture of upper and lower case letters, symbols, numbers and/or spaces. And use a unique password for each account.

Wireless Encryption

The next step you will want to take is to encrypt the data that is processed through your wireless router, but before you are able to do that, you need to know what type of encryption to use.

There are actually three different types of data encryption on routers that function on the 802.11 standard: wired equivalency protection (WEP), Wi-Fi protected access (WPA) and Wi-Fi protected access 2 (WPA2).

The first was established in the 1990s as the first 802.11 standard encryption algorithm but was quickly discovered to have some major security flaws, including those that contributed to cyberattacks on major retailers.

After many years and improvements to security, WPA2 emerged. Developed by the U.S. government in 2004 to protect classified data, it is now the security standard for all wireless routers. It is not without its flaws, as no method of internet security is foolproof, but it is the most secure encryption standard currently available.

However, WPA2 is not always automatically equipped on your router and may need to be turned on manually. You can find instructions on how to do this either in your router’s user manual or through its web page.

Cyberattacks can result from any Wi-Fi-capable device, including your baby monitor. Taking precautions when selecting your baby monitor and securing your wireless network can help to protect you and your family from unsettling and invasive attacks.

The New ID Theft: Millions of Credit Applicants Who Don’t Exist

From a townhouse near a megachurch in Atlanta, Kelvin Lyles recruited about 300 accomplices to embark on a crime spree. His group scammed ATMs, internet retailers and credit-card companies, grabbing around $350,000, until late 2015, when federal agents closed in.

Mr. Lyles was the only one convicted. None of his accomplices existed.

In a twist on ID theft, criminals are deploying figments of their imaginations, in what is often called synthetic-identity fraud. It’s one of the fastest growing forms of identity crimes, the Justice Department says, and among the hardest to combat.

Because the person taking out cards or loans isn’t real, there are no consumer victims to alert lenders. When companies and law enforcement discover something amiss, they often wind up chasing ghosts. Mr. Lyles secured credit cards often using fictional names and numbers the Social Security Administration hadn’t yet assigned.

Synthetic-identity fraud exploits a vulnerability in America’s consumer-credit system. Lenders often consider a loan applicant legitimate if the applicant has a credit report at Equifax Inc., TransUnion or Experian PLC. But a new “credit file”—essentially a precursor to a credit report—often gets created when someone simply applies, even if the loan doesn’t come through.

Some lenders approve loans after reviewing credit files, which helps turn those files into full credit reports. That’s how a fictitious person, or 300 fictional people, can end up with a credit card.

While a small part of total identity-fraud losses—that number hit about $16.8 billion in 2017, according to consulting firm Javelin Strategy & Research—synthetic-identity losses are soaring.

TransUnion says a record $355 million in outstanding credit-card balances was owed by people who it suspects didn’t exist in 2017, up more than eightfold from 2012. It estimates lenders have issued credit cards or loans to millions of synthetic identities in the U.S.

In January, Accenture PLC listed synthetic-identity fraud as one of the biggest threats facing banks in 2018, saying it would be “costing banks billions of dollars and countless hours as they chase down people who don’t even exist.”

The Definitive Guide to Simple Internet Privacy and Security

privacy.PNG

The technological age of the internet has changed the way we shop, talk to each other and work. But with so much personal data being transmitted across what is at times a public landscape, the need to understand online privacy and security is more important than ever. Let’s take a look at some of the most important factors when it comes to internet safety.

Passwords

Having a strong password is one of the most crucial elements of remaining safe in an online capacity. It’s increasingly becoming the case that websites are asking for stronger, more obscure passwords. This often involves adding a numerical character or a capitalized letter.

Some tips include:

  • Using something unrelated to you
  • Making your password as long as possible
  • Using a different password for every website

Stick to these rules, and you’ll find your password is practically impregnable.

Https and http

You’ve probably noticed these words in the search bar before, but have no idea what they really mean. While breaking them down in explicit terms might be a little complex, the basic premise you need to understand is:

  • https – secure
  • http – unsecure

If you’re on a website (particularly e-commerce sites) where you see http listed, the data isn’t encrypted. That means anything you enter on that site (including personal financial details) is being transmitted on a public network and could potentially be accessed. 

Antivirus

Antivirus software is crucial to protecting your computer from a number of potentially deadly viruses. There are a series of ways in which your device can become infected if you don’t clog loopholes.

That’s why it’s so important to not only install antivirus, but also check for regular updates. This should be done daily. You won’t want to fall behind the curve and let yourself become exposed. 

Social Media

Social media has changed the way we interact as a society. Because we associate talking to our friends with these platforms, it’s easy to forget there are people out there looking to take advantage. As such, it’s critical to never share anything too personal on them.

Ensure you aren’t making yourself a target on a social network:

  • Don’t accept friend requests or private messages from people you don’t know
  • Block people who approach you inappropriately
  • Avoid including overly personal details about yourself in a post

It’s wrong to be scared by social media, but it’s also not wise to publicise too much about yourself on there. Some things should stay private.

Moviepass CEO Brags App Tracks Your Location Before and After Movies

Everyone knew the MoviePass deal is too good to be true — and as is so often the case these days, it turns out you’re not the customer, you’re the product. And in this case they’re not even attempting to camouflage that. Mitch Lowe, the company’s CEO, told an audience at a Hollywood event that “we know all about you.”

“We get an enormous amount of information,” Lowe continued. “We watch how you drive from home to the movies. We watch where you go afterwards.”

It’s no secret that MoviePass is planning on making hay out of the data collected through its service. But what I imagined, and what I think most people imagined, was that it would be interesting next-generation data about ticket sales, movie browsing, A/B testing on promotions in the app and so on.

I didn’t imagine that the app would be tracking your location before you even left your home, and then follow you while you drive back or head out for a drink afterwards. Did you?

It sure isn’t in the company’s privacy policy, which in relation to location tracking discloses only a “single request” when selecting a theater, which will “only be used as a means to develop, improve, and personalize the service.” Which part of development requires them to track you before and after you see the movie?

The startup’s plan is to “build a night at the movies,” perhaps complete with setting up parking or ordering you a car, giving you a deal on dinner before or after, connecting you with like-minded moviegoers, etc. Of course they need data to do that, but one would hope that the collection would be a bit more nuanced than this.

In a statement, a MoviePass representative says:

We are exploring utilizing location-based marketing as a way to help enhance the overall experience by creating more opportunities for our subscribers to enjoy all the various elements of a good movie night. We will not be selling the data that we gather. Rather, we will use it to better inform how to market potential customer benefits including discounts on transportation, coupons for nearby restaurants, and other similar opportunities.

Tencent Lets Parents Reward Kids' Good Grades With Game Time

If you grew up with video games as a kid, you probably struck a deal with your parents: pass a school test with flying colors and you can play more. Tencent wants to formalize those arrangements. Chief executive Ma Huateng has proposed digital contracts that offer game time to kids (for Tencent games, of course) in return for either reaching certain academic criteria or performing chores around the home. He wasn't specific about when these agreements would be available, but he noted that children could have their friends witness the signing of a contract.

This isn't an altruistic gesture. Tencent's Honor of Kings (Arena of Valor in the US) has been so popular and addictive in its native China that the mobile multiplayer title now has time limits to prevent kids from playing too long. Between that and a degree of Chinese government pressure (games like HoK have been likened to "opium" by one delegate), Tencent has an incentive to implement its own limits before officials impose them.

Not that it's the only company facing scrutiny. The World Health Organization has considered formally recognizing video game addictions, and mobile OS developers like Apple have promised more parental controls that restrict overall phone use. In that light, Tencent isn't so much leading the way as it is responding to an emerging trend.