- Swipe This! I’m ashamed to tell anyone about my online shopping habit 4 Years Ago
- UPS facing backlash for thanking police after employee killed in shootout Saturday 5:02 PM
- Sanders campaign fires staffer after anti-Semitic, homophobic tweets surface Saturday 3:13 PM
- Brother Nature was attacked, says everyone just watched with phones out Saturday 2:45 PM
- Ryan Reynolds’ gin company hires Peloton wife for ad Saturday 1:24 PM
- Ex-vegan YouTuber accused of fraud after following meat-only diet Saturday 1:11 PM
- The 15 best Disney+ hidden gems and deep cuts Saturday 12:23 PM
- Everyone in GoFundMe scam involving homeless veteran has now pleaded guilty Saturday 12:06 PM
- Boy invites kindergarten class to his adoption–and people are emotional Saturday 11:56 AM
- Reddit links leaked trade deal documents to Russian campaign Saturday 10:44 AM
- How to stream Alistair Overeem vs. Jairzinho Rozenstruik Saturday 8:30 AM
- Amazon sends customers condoms and soap instead of Nintendo Switch Saturday 8:28 AM
- How to live stream Jermall Charlo vs. Dennis Hogan Saturday 8:00 AM
- Apple TV’s ‘Truth Be Told’ is a criminally dull drama Saturday 6:00 AM
- Thousands of Uber users have reported sexual assaults, company says Friday 5:40 PM
Security flaw compromises location of Nest Thermostat owners
Princeton student finds flaw in Nest Labs device.
A security bug discovered by Princeton researchers leaked the location information of Nest Thermostat owners over the Internet.
The Nest Learning Thermostat first launched in 2011, with the company claiming that its Internet-connected data logging and app-like interface could save homeowners money by learning when to adjust itself for maximum energy conservation. Google purchased Nest for $3.2 billion last year, and it is now under the umbrella company Alphabet.
Nest was quick to respond to the Princeton findings, but while the vulnerabilities existed anyone searching through network traffic could obtain this unencrypted information. The vulnerability came from Nest’s weather update feature, which leaked the locations of customer homes.
The findings were discovered by Sarthak Grover, a Ph.D student at the Center for Information Technology Policy at Princeton, and research fellow Roya Ensafi. Grover and Ensafi tested a number of Internet of Things devices for security flaws including Pixstar Smart Photoframe, Ubi voice-control device and Samsung SmarThings Hub. They presented their research last week at PrivacyCon 2016 in Washington D.C.
“The security of the Internet of Things is a huge issue,” EFF Senior Staff Attorney Lee Tien wrote in an email to the Daily Dot. “A lot of IoT devices are small and relatively inexpensive, and might well rely on wifi connections to the cloud. How’s that data going to be secured? Is it encrypted or will it be transmitted in the clear available for processing by anyone who can capture it? Obviously, if I learn that your home thermostat is sitting at 55 degrees in the winter, I can make a good guess about whether anyone’s at home.”
This is not the first security vulnerability from Google‘s sister company, Nest, and its first child, the Nest Learning Thermostat. Last year we reported on a 15-second USB hack that would give hackers full remote controls and access to information on the daily whereabouts of owners.
Even with these findings Grover considered Nest’s Thermostat to be “one of the more secure devices” in his test. It is not the sort of title that would instill confidence in the security of our future technology. So next time you think of making your house a little smarter keep in mind that while some of these devices are smart enough to store your information, they might be missing the part of the brain that keeps it safe from others.
H/T Motherboard | Photo via Nest