Just How Much Does Your Smart Home Know?
|

Just How Much Does Your Smart Home Know?

Turns out, it’s quite a lot. We’ve all kind of known that Alexa is always listening, and recording, but do we realize how much? Quoting Sharon Nelson’s discussion of another report – Yes, Alexa Does Eavesdrop on You! The author of the article listened to four years of his Alexa archive and found thousands of…

Linked: How Nest, designed to keep intruders out of people’s homes, effectively allowed hackers to get in
|

Linked: How Nest, designed to keep intruders out of people’s homes, effectively allowed hackers to get in

In this case, it wasn’t even that Nest had an insecure device, though that is often open to debate with Internet of Things devices. No, this was all about reusing passwords. “The method used to spy on the Thomases is one of the oldest tricks on the Internet. Hackers essentially look for email addresses and…

What I’m Sharing (weekly)

What I’m Sharing (weekly)

The state of legal tech Forgot password? Five reasons why you need a password manager Discarded smart lightbulbs reveal your wifi passwords, stored in the clear Law firms’ shopping mall problem Mitigating #eDiscovery challenges in the healthcare industry Ride The Lightning: Crypto Exchange Founder Dies – And His Password Died With Him Lawyers and Cybersecurity…

What I’m Sharing (weekly)

What I’m Sharing (weekly)

When E-Discovery Became a Thing: Judges Reflect on Court’s ESI Evolution Zero to Sixty in Ediscovery: The Value of On- and Off-the-Job Training Why We Need to Talk about Mental Health Regularly at the Workplace “Not conducting exit interviews on your departing employees? You should be!” A Lawyer’s Obligation to be Technologically Competent – Part…

Linked – For Owners of Amazon’s Ring Security Cameras, Strangers May Have Been Watching
|

Linked – For Owners of Amazon’s Ring Security Cameras, Strangers May Have Been Watching

The story is disturbing on many levels, but for me this is the part that is both obvious, and a reason why IoT devices deserve a lot more careful consideration than we have been giving them. “At the time the Ukrainian access was provided, the video files were left unencrypted, the source said, because of…

Linked – Weak passwords banned in California from 2020
|

Linked – Weak passwords banned in California from 2020

From a cybersecurity standpoint, this is a good idea. It demands that each gadget be given a unique password when it is made. From a “user has no idea how to get into the device because they never knew the password” standpoint, on the other hand? Yeah that’s going to be a mess. I predict…