Use this home security camera buying guide to be safer at home

Here’s a conundrum: Your security camera could expose you to data breaches. Last year, a security researcher found that Eufy cameras uploaded private images to the cloud.

Anker recently admitted to storing images and video feeds in the cloud without users’ knowledge. This popular security cam manufacturer recently didn’t even encrypt the private content. That means anyone could have seen your personal images through your Anker devices.

The next time you want to upgrade your system, check this home security camera buying guide.

Home security camera buying tips

Don’t let this story dissuade you from protecting your home. Security cameras and video doorbells are easy and affordable ways to protect your home. Just make sure you’re using these strategies when shopping.

  1. Pick a tool with 2FA: Two-factor authentication adds an extra layer of security between your smart home and a snoop. Maybe someone in your life wants to see what you’re doing. Protect your privacy by requiring anyone who tries to access the system to provide a private code only you get. Authenticator apps are some of the best 2FA methods. We’ll help you set them up to secure your work accounts or security gadgets.
  2. Research the company’s data breach history: Some brands will put you in more danger than others. If a company has a long history of security breaches, you’re better off with another option.
  3. Consider the brand’s relationship with police: Are you comfortable with the police using your private footage? Arlo, Eufy, Wyze and Apple won’t share your footage without a court order or warrant.
  4. Go with big brands: Since large companies get more coverage, they’re also scrutinized and tested by security researchers, journalists and hobbyists. That means you’ll have more luck if you have questions since you’ll get more helpful results when researching security concerns.

Keep this in mind

Unfortunately, you must assume that your smart devices can be breached at anytime. All devices have vulnerabilities. Even the most trustworthy brand could have a hidden weakness a security researcher hasn’t discovered yet.

Think about the placement of your cameras. When a hacker could steal footage of you doing something private, like using the restroom, it’s time to move the security camera to a spot that preserves your privacy. Here are the best places to put your home security cameras.

Also, you could keep your camera’s storage system in mind. Before buying a security tool, consider where the footage will go. For example, a local storage system keeps your private videos from a company’s hands.

You don’t even have to connect your cameras to the internet. But if you get them without Wi-Fi, ensure they offer end-to-end encryption. We can help you save some research time. Check out the best security cameras for properties with bad or no Wi-Fi.

Save yourself time by using the home security system Kim trusts

Continue reading

You can get the latest iPhone updates early if you take this simple step

Apple’s Craig Federighi recently rocked our worlds with one insight into automatic iPhone updates that we find fascinating. If you’ve ever wondered why it takes so long for your iPhone to update itself, you’ll want to check this out. Your iPhone’s security may be hanging in the balance.

Continue reading

Why does the government sell a $1K jar of peanut butter?

There’s a government warehouse that stores just about everything you could imagine — vitamins, “domestic sludge,” a standard bullet and even a jar of peanut butter that sells for about 200 times the going grocery store rate. It even maintains a cybersecurity database with all known software vulnerabilities. You’ll find all this at the National Institute of Standards and Technology. So, what is going on?

👨‍💻 Say goodbye to being a cybersecurity researcher: For the very first time, it wasn’t a person who found a zero-day vulnerability; it was AI. Google’s Big Sleep AI used a method called “fuzzing.” In case you’re curious, the AI feeds random data into software to expose errors in the code hackers could exploit.

$1,000,000 bounty

For anyone who catches a major Samsung security flaw. Bag a local arbitrary execution to score $300,000. Remote code execution vulnerabilities are worth up to $1 million. If you know what those terms mean, get to work.

Check this list - Phones vulnerable to a new no-click hack

Researchers recently discovered that certain mobile phones suffer from a severe flaw where no user interaction is required to be hacked. These are called no-click hacks, and often the criminal only needs to know the target’s phone number.

Continue reading

Patch your Windows PC! Here's what the latest update does

Microsoft routinely patches various products and services but usually focuses on the Windows operating system. March’s Patch Tuesday update is no different, and it fixes several flaws that hackers can exploit.

Read on to see what this update entails and how to get it.

Continue reading

⚠️ Use Windows Enterprise software? There’s a critical vulnerability rated 9.8 out of 10 (really bad) in Microsoft Configuration Manager. CVE-2024-43468 is extremely dangerous, allowing hackers to take control of your system and network remotely. You can’t fix this with a normal patch; it requires an in-console update inside the Configuration Manager. Full steps here.

Update Chrome now: Google just dropped an update that fixes four high-severity vulnerabilities. No details yet on whether hackers have exploited them, but don’t wait to find out. In Chrome, go to Settings > About Chrome, download the latest patch, and hit Relaunch. You should be on version 128.0.6613.137 or 128.0.6613.138, depending on your OS.

TVs hacked: LG patched four huge vulnerabilities that let hackers spy on what you watch and install unwanted apps that can give them access to everything on your network. Yes, that’s bad. Here’s how to update your TV: Go to Settings > All Settings > Support > Software Update > Check for Updates. Btw, you should check for updates on your TV even if it isn’t manufactured by LG; if hackers hit LG, others are next in line.

Have a DJI drone? Beware of this serious security flaw

Drones are complex devices and need to have their firmware updated often. Sometimes this adds more features. On other occasions, it’s desperately needed to plug security flaws.

Read on to see how a flaw can bring down your DJI drone and expose your location.

Continue reading

Patch your Windows PC now to fix 3 zero-day exploits

Keeping your operating system updated is a great way to fend off cybercriminals. Many Widows updates contain patches that fix vulnerabilities that hackers can exploit. The latest Windows update is no different, as it fixes three dangerous zero-day flaws.

Continue reading

iOS 16.3.1 fixes major vulnerabilities but may cause a problem for this popular app

Google recently updated the world’s most popular browser, patching up 15 security flaws and adding some new features. Here’s what you get with the latest version of Chrome.

That’s not all we have in update news. Apple released an update that fixes some features and patches two significant vulnerabilities. Here’s what you need to know.

Continue reading

The simple but dangerous mistake you make with your phone every day

Your smartphone has many settings to protect your privacy, and you may not always be aware of them. Tap or click here for new iPhone and Android security features to turn on.

Then there’s the other side of the coin. There are some features you should leave off, especially if you’re not using them. Some are minor annoyances, while others can expose you to cybercriminals.

Continue reading

Drive a Toyota, Kia, Mercedes or BMW? Your personal info may have been exposed

Hackers are always looking for new ways to get their hands on your data. It even trumps your credit or debit card details. Unfortunately, security breaches happen on a more grand scale than most would like to know, such as the IRS leak from late last year.

Continue reading

Have this security cam at home? You should probably stop using it

Tech makes for great Christmas presents, but be careful — you may be giving your loved ones more than they wish for. Here are the five worst and five best tech devices regarding privacy. 

Among the biggest offenders that have made headlines recently is Eufy, a subsidiary of Anker. The company sells smart locks, doorbells, cameras, hubs and more.

Continue reading

Update your PC! Microsoft patches 63 flaws - including a zero-day

Every computer user should mark the second Tuesday of every month on their calendar. If you don’t know why it’s because most software developers push out critical updates to various apps and operating systems.

While these can sometimes include new features and graphical overhauls, it generally plugs security vulnerabilities and flaws that hackers can exploit. September is essential if you have a Windows-based computer, as Microsoft patched 63 flaws with its latest release.

Continue reading

Have an HP computer? These dangerous bugs have been unpatched for a YEAR

A great way to protect your data and personal information from cybercriminals is to keep your devices up to date. Microsoft and Apple regularly push out updates that fix vulnerabilities, but it’s your responsibility to ensure your gadgets get those updates.

Continue reading

Update your PC! Patch fixes a zero-day and 121 flaws

If you own a Windows-based computer, you must install the latest update from Microsoft ASAP. Hackers can use several security flaws to breach your computer and steal your data.

It’s not just Windows sending constant updates. Every app you use needs to be updated frequently. For example, Google rolled out an urgent update for its Chrome browser last week, patching 27 issues. The latest update from Microsoft corrects a massive 121 flaws.

Continue reading

Protect your tech: Time to update Chrome, Windows and iOS

One of the easiest ways to protect against security flaws, hacks, bugs and viruses is to keep your software and devices updated. Developers push updates and patches to repair known security issues and prevent future ones.

Continue reading