- Chaotic good, true neutral: The 2020 Democrat alignment chart Today 6:30 AM
- How to stream Mexico vs. Brazil live in the U-17 World Cup final Today 3:00 AM
- Influencer gets prison time for performing illegal cosmetic procedures on followers Saturday 5:13 PM
- Parent immediately regrets baby monitor after seeing ‘possessed’ baby Saturday 3:53 PM
- Buttigieg used Kenyan stock photo to promote plan for Black America Saturday 2:29 PM
- Disney+ is the best streaming service for families available today Saturday 1:43 PM
- Netflix to amend Nazi docuseries after being accused of rewriting history Saturday 1:09 PM
- Everything you need to know about TikTok Saturday 1:00 PM
- Screaming drummer girl steals hearts with passionate Nirvana cover Saturday 12:50 PM
- The Kardashians receiving backlash for food fight Instagram post Saturday 10:26 AM
- How to stream Artem Lobov vs. Jason Knight in BKFC Saturday 9:00 AM
- Lizzo sued by Postmates runner she accused of stealing her food Saturday 8:39 AM
- How to stream Jan Blachowicz vs. Ronaldo ‘Jacare’ Souza on UFC Fight Night Saturday 8:00 AM
- How to watch Georgia vs. Auburn live Saturday 6:30 AM
- How to stream Navy vs. Notre Dame live Saturday 3:30 AM
A smart home device developed by Google can be temporarily rendered inoperable with just a single line of code, a security advocate has revealed.
Jerry Gamblin, a self-described problem solver and hacker, outlined in a blog post this week just how easily Google’s Home Hub can be bricked.
After purchasing the home assistant, Gamblin says he discovered how to make the device forget all stored Wi-Fi connections, forcing it back to the setup screen.
“This command basically makes the device unusable until you manually reconfigure it using the Google Home application,” Gamblin wrote.
Another line of code, entered without needing any authentication, also forced the Home Hub to reboot.
Gamblin also crafted codes to erase certain settings, gather device info, and disable notifications.
“I am genuinely shocked by how poor the overall security of these devices are, even more so when you see that these endpoints have been known for years and relatively well documented,” Gamblin wrote.
A Google spokesperson, however, pushed back on Gamblin’s findings in a statement to CNET, arguing that an attacker would already have to be connected to your home Wi-Fi to deliver malicious code.
“All Google Home devices are designed with user security and privacy top of mind and use a hardware-protected boot mechanism to ensure that only Google-authenticated code is used on the device,” the statement said. “In addition, any communication carrying user information is authenticated and encrypted.”
Describing Gamblin’s findings as “inaccurate,” Google further stated that “Despite what’s been claimed, there is no evidence that user information is at risk.”
CNET says the findings point more to the importance of securing your home Wi-Fi than to issues surrounding digital home assistants.
Mikael Thalen is a tech and security reporter based in Seattle, covering social media, data breaches, hackers, and more.