NEW YORK Did someone invite a spy into your home over the holidays? Maybe so, if a friend or family member gave you a voice-controlled speaker or some other smart device.
It's easy to forget, but everything from internet-connected speakers with voice assistants such as Amazon's Alexa to television sets with built-in Netflix can be always listening and sometimes watching, too. As with almost all new technology, installing such devices means balancing privacy risks with the conveniences they offer.
The research firm IDC estimates worldwide shipments of 815 million smart speakers, security cameras and other devices in 2019, up 23% from 2018. Many of the sales are for gifts.
You could sidestep the risks altogether by returning the devices right away. But if you decide to keep them and the artificial intelligence behind them there are a few things you can do to minimize their eavesdropping potential.
THE SPEAKERS LISTEN ... AND WATCH
Smart speakers such as Amazon's Echo and Google Home let you check weather and appointments with simple voice commands. Fancier versions come with cameras and screens.
Many of these devices listen constantly for commands and connect to corporate servers to carry them out. Typically, they will ignore private chatter and transmit sound recordings only when you trigger the device, such as by pressing a button or speaking a command phrase like "OK Google. Some gadgets also have a mute button to disable the microphones completely.
But there's no easy way for consumers to verify those safeguards. In one case, the Alexa assistant in an Echo device misheard background conversation as a command to send the chatter to an acquitance and so it did.
One more catch: Voice commands sent over the internet are typically stored indefinitely and may include conversations in the background. They can be sought in lawsuits and investigations.
Reputable companies let you review and delete your voice history, Amazon now lets you request automatic deletions after three or 18 months but you need to set that up, and theres no option to keep Amazon from saving your command history at all.
Until recently, tech companies allowed employees and contractors to review the voice interactions for quality control and some of those details leaked. Following a backlash, many companies are at least making it clearer and easier to opt out of human review. Pay attention to your choices.
If you have kids, set up a passcode for shopping if your speaker allows it. Otherwise, it can be child's play for a kid to order toys and other goodies through Alexa.
As for those screen models, many also have cameras for video chats. When youre not using the device, consider turning it around to face the wall, especially in the bedroom and other private settings. Or stick a bandage or some tape over the camera. It shouldnt be recording, but why tempt fate?
SECURITY WITH SECURITY VIDEO
Online security cameras let you check in on your pets or kids when you're not home. Amazons Ring doorbell lets you check whos at the door without getting up.
Heres the rub: If you can view video on an app, it's possible that a skilled hacker can, too.
When you use the same password at multiple services, a hacker stealing your password from one place can try it on the camera service, too. So dont reuse password. When available, enable two-factor authentication, which requires you to enter a temporary code sent as a text to ensure its you.
Again, you might want to turn the camera to face the wall when you're home. It's a pain, though, and if you forget to turn it back when you leave, it defeats the purpose of having a security camera.
ARE SMART LOCKS SMART?
Smart locks let you unlock doors with an app, so you can let in guests even when you're not home. Burglars might try to hack the system, though it's often easier for them to just break a window.
As a precaution, disable any capabilities to unlock doors through a smart speaker voice command, especially if you have prankster kids or teens who might want to sneak someone in.
Though digital keys can be convenient for letting in guests and contractors, they can also leave a digital trail. In a child-custody dispute, for instance, your ex might subpoena the records to learn that you've been staying out late on school nights. If you rent and create a guest key that's used daily, the landlord might suspect an unauthorized occupant.
ABOUT THOSE TVs
Many smart TVs and TV streaming devices come with mics for voice-activated playback controls and video search. That means having audio snippets transmitted over the internet. The same warnings for smart speakers apply here.
There's a simple fix if you aren't using the internet features on your smart TV: Just don't connect the TV to your Wi-Fi in the first place. Of course, this won't work if you're not using a separate gadget for streaming video.
TOYS THAT TALK
Kids might get a kick out of dolls and other toys that talk back. But if the toy is connected to the internet, pay attention to how much control its giving parents and whether its letting kids connect to the outside world. You can check online to see if other parents or consumer groups have identified problems.
And be sure to install the latest apps and other software updates, as they may come with fixes for flaws that can otherwise be exploited by hackers.
- Beware of a cyber attack - faribaultcountyregister.com | News, Sports, Information on the Blue Earth region - Faribault County Register - February 24th, 2020
- Internet security Market 2020 Global Analysis, Research, Applications and Forecast to 2026 - Jewish Life News - February 24th, 2020
- Letter: It's an election year why isn't cybercrime on voters' minds? - Greenville News - February 24th, 2020
- Vigilantes and private security are policing the internet where governments have failed - The South African - February 24th, 2020
- Best Protection Against File Less Malware and Advanced Threats: Kaspersky Scores Most Top Three Places in 2019 Test Results - Al-Bawaba - February 24th, 2020
- The cannabis industry's next big threat: Hacks and fraud - WICZ - February 24th, 2020
- Straight Talk: That voicemail from the boss might be fake - Canton Repository - February 24th, 2020
- Microsoft patches IE vulnerability being exploited in the wild - SC Magazine - February 24th, 2020
- The best antivirus protection of 2020 for Windows 10 - CNET - February 23rd, 2020
- Vigilantes and private security are policing the internet where governments have failed - The Conversation UK - February 23rd, 2020
- The top UK cyber security companies - Information Age - February 23rd, 2020
- Cyber Minds: Expert Insights on Blockchain and Much More - Government Technology - February 23rd, 2020
- 5G and the Huawei controversy: is it about more than just security? - BBC Focus Magazine - February 23rd, 2020
- Recent IPO Cloudflare Closes Out 2019 Strong and Is Poised for More Growth - Motley Fool - February 23rd, 2020
- For Free Expression in Iran, the U.S. Can Act to Keep the Internet On - Just Security - February 23rd, 2020
- CoinGeek London: When Bitcoin SV came of age - CoinGeek - February 23rd, 2020
- Akamai: API Attacks by Cybercriminals are on the Rise - Media & Entertainment Services Alliance M&E Daily Newsletter - February 23rd, 2020
- What the Hell Is That Device, and Is It Spying on You? This App Might Have the Answer - VICE - February 23rd, 2020
- Most credential abuse attacks against the financial sector targeted APIs - Help Net Security - February 23rd, 2020
- The Cannabis Industrys Next Big Threat: Hacks And Fraud - CBS Denver - February 23rd, 2020
- Google removes nearly 600 ad-ware apps from Play store - Deccan Herald - February 23rd, 2020
- Internet of Things (IoT) Security Market Current Trends, Services, Innovations, Key Features Technology, Company Profiles, Demand, Growth... - February 23rd, 2020
- The Top 7 Network Security Books You Need to Read in 2020 - Solutions Review - February 23rd, 2020
- Cyber Security & Network Security Services - Internet ... - February 18th, 2020
- Google Announced US$1 Million for its Be Internet Awesome Initiative - CISO MAG - February 18th, 2020
- Internet security Market Analysis With Key Players, Applications, Trends and Forecast To 2026 - Instant Tech News - February 18th, 2020
- Cybersecurity Level in the Middle East: An Overview of the Cybersecurity Market State - SCOOP EMPIRE - February 18th, 2020
- Quantum internet: the next global network is already being laid - The Conversation UK - February 18th, 2020
- IC3.gov 2019 Internet Crime Report: Its All About that BEC - Security Boulevard - February 18th, 2020
- Sophos Cloud Optix breakthrough IAM visualization is here - Naked Security - February 18th, 2020
- Stay Safe, Secure And Anonymous Online with The Doe - London Post - February 18th, 2020
- Industry Insight: The CCPAs Elusive Reasonable Security Safe Harbor - JD Supra - February 18th, 2020
- WISeKey Drives Innovations in IoT Security with 23 Strategic Patents in the U.S. - GlobeNewswire - February 18th, 2020
- IT Security Consulting Services Market Size, Share, Types, Growth Strategies, Interactive Components, Key Companies Overview and Forecast Outlook by... - February 18th, 2020
- Market Size of Internet of Things (IoT) Security Product , Forecast Report 2019-2026 - Redhill Local Councillors - February 18th, 2020
- Internet of Things (IoT) Security Market Projected To Witness Vigorous Expansion By 2026 - Instant Tech News - February 18th, 2020
- 40% respondents ready to share personal details on dating apps without meeting person - The News Minute - February 18th, 2020
- How to protect your personal information online during tax season - CTV News - February 18th, 2020
- It is with a heavy heart we must inform you, once again, folks are accidentally spilling thousands of sensitive pics, records onto the internet - The... - February 18th, 2020
- Security of online voting questioned | News, Sports, Jobs - The Daily Times - February 16th, 2020
- This may be the last piece I write: prominent Xi critic has internet cut after house arrest - The Guardian - February 16th, 2020
- An Alternative to Windows 7 - Budapest Business Journal - February 16th, 2020
- North Koreas Internet Use Surges, Thwarting Sanctions and Fueling Theft - The Indian Express - February 16th, 2020
- Microsoft Patch Tuesday fixes IE zeroday and 98 other flaws - We Live Security - February 16th, 2020
- 'More guidance and regulation': Zuckerberg requests government rules on 'what discourse should be allowed' - Washington Examiner - February 16th, 2020
- Internet of Things (IoT) Security Product Market: Development Factors and Investment Analysis by Leading Manufacturers 2018 2026 - TechNews.mobi - February 16th, 2020
- Our personal health history is too valuable to be harvested by the tech giants - The Guardian - February 16th, 2020
- Cyber Security Today The latest FBI Internet crime report, adware on the rise, attacks on Wi-Fi and more - IT World Canada - February 15th, 2020
- Indias proposed internet regulations can threaten privacy everywhere - The News International - February 15th, 2020
- Antivirus Is Not Enough in 2020: Here is Why - laprogressive.com - February 15th, 2020
- FBI: Cybercrime losses tripled over the last 5 years - We Live Security - February 15th, 2020
- AIoT Convergence of Artificial Intelligence with the Internet of Things - EnterpriseTalk - February 15th, 2020
- Indias proposed internet regulations could threaten privacy everywhere - The Verge - February 15th, 2020
- Global Internet of Things (IoT) Security Market Key Players, Share, Trend, Segmentation and Forecast to 2026: Cisco Systems, Intel Corporation, IBM... - February 15th, 2020
- Romance scammers stole $475m last year. Here's how to spot them - Verdict - February 15th, 2020
- Safer Internet Day 2020 Together for a better internet - Security Boulevard - February 14th, 2020
- Internet's safe-keepers forced to postpone crucial DNSSEC root key signing ceremony no, not a hacker attack, but because they can't open a safe - The... - February 14th, 2020
- Here's how to avoid becoming a victim of a tax scam - AZ Big Media - February 14th, 2020
- Will Weak Passwords Doom the Internet of Things (IoT)? - Security Intelligence - February 14th, 2020
- Bithumb Employee Found Guilty of Security Failings that Led to Hack - Cryptonews - February 14th, 2020
- Will your vote count? Ohio working to increase election security - WHIO - February 14th, 2020
- Perimeter 81 Introduces SASE Platform This latest offer is based on a partnership with investor and - Channel Futures - February 14th, 2020
- NHS Secure Boundary the next layer of cyber protection for the NHS - Digital Health - February 14th, 2020
- Global Internet of Things (IoT) Security Market Segmentation along with Regional Outlook, Competitive Strategies, Factors Contributing to Growth and... - February 14th, 2020
- North Koreas Internet Use Surges, Thwarting Sanctions and Fueling Theft - The New York Times - February 14th, 2020
- TechForce Aberdeen event to kick off Cyber Scotland Week - The Scotsman - February 14th, 2020
- Security Strategy: Moving Away From Tried and True - Security Boulevard - February 5th, 2020
- Internet Security Software Market investigated in the latest research - WhaTech Technology and Markets News - February 5th, 2020
- What Is Log Management, and Why Is It Important? - Security Boulevard - February 5th, 2020
- Latest Released 2020 Version Of Internet Security Market With Market Data Tables, Graphs, Figures and Pie Chat - TheLoop21 - February 5th, 2020
- Booter Boss Busted By Bacon Pizza Buy - Krebs on Security - February 5th, 2020
- Yet another Windows 10 fail as new update breaks the internet - heres how to fix it - TechRadar India - February 5th, 2020
- 'Formjacking' Is the New Internet Scam We Need to Watch Out For - q985online.com - February 5th, 2020
- Kiwis think benefits of the internet outweigh the negatives - SecurityBrief New Zealand - February 5th, 2020
- GAO: DHS and Agencies Must Work to Improve Cybersecurity - HSToday - February 5th, 2020
- Government to strengthen security of internet-connected products - GOV.UK - January 31st, 2020
- DigiCert Leads Initiative to Enhance EV SSL Certificates - Security Boulevard - January 31st, 2020
- eScan Internet Security Suite - Download - January 30th, 2020
- Internet Security - January 30th, 2020
- Best malware removal software of 2020: free and paid anti-malware tools and services - TechRadar - January 30th, 2020