- A lonely grandma sought family to spend Christmas with on Craigslist Saturday 5:45 PM
- Airbnb bans white supremacists tied to Iron March forum Saturday 5:07 PM
- Did a Twitter user really get tricked into naming baby ‘Jack Ingof’? Saturday 4:46 PM
- State of emergency declared in New Orleans following ‘cyberattack’ Saturday 4:12 PM
- Video shows boy getting beat up–mom says it’s because he wore MAGA hat Saturday 3:54 PM
- Billboard changing albums chart to count YouTube streams Saturday 2:43 PM
- TikTok’s 20 most popular songs of 2019 Saturday 2:14 PM
- Greek gods memes are flooding Reddit thanks to TV reboot rumors Saturday 1:47 PM
- Anti-impeachment protesters aimlessly fumble through halls of Congress Saturday 12:54 PM
- Everything we know so far about the Xbox Series X Saturday 12:17 PM
- ASMR YouTuber Life with MaK says she was branded a ‘Nazi’ by online smear campaign Saturday 10:46 AM
- Voters duped by fake ex-Bloomberg intern’s tweet about being fired Saturday 9:47 AM
- HBO’s ‘Watchmen’ and the fantasy of competence Saturday 8:00 AM
- Cómo ver Kamaru Usman vs. Colby Covington en el UFC 245 Saturday 7:00 AM
- ‘Penis fish’ memes erupt after worms wash up on California coast Friday 5:58 PM
Security flaw compromises location of Nest Thermostat owners
Princeton student finds flaw in Nest Labs device.
A security bug discovered by Princeton researchers leaked the location information of Nest Thermostat owners over the Internet.
The Nest Learning Thermostat first launched in 2011, with the company claiming that its Internet-connected data logging and app-like interface could save homeowners money by learning when to adjust itself for maximum energy conservation. Google purchased Nest for $3.2 billion last year, and it is now under the umbrella company Alphabet.
Nest was quick to respond to the Princeton findings, but while the vulnerabilities existed anyone searching through network traffic could obtain this unencrypted information. The vulnerability came from Nest’s weather update feature, which leaked the locations of customer homes.
The findings were discovered by Sarthak Grover, a Ph.D student at the Center for Information Technology Policy at Princeton, and research fellow Roya Ensafi. Grover and Ensafi tested a number of Internet of Things devices for security flaws including Pixstar Smart Photoframe, Ubi voice-control device and Samsung SmarThings Hub. They presented their research last week at PrivacyCon 2016 in Washington D.C.
“The security of the Internet of Things is a huge issue,” EFF Senior Staff Attorney Lee Tien wrote in an email to the Daily Dot. “A lot of IoT devices are small and relatively inexpensive, and might well rely on wifi connections to the cloud. How’s that data going to be secured? Is it encrypted or will it be transmitted in the clear available for processing by anyone who can capture it? Obviously, if I learn that your home thermostat is sitting at 55 degrees in the winter, I can make a good guess about whether anyone’s at home.”
This is not the first security vulnerability from Google‘s sister company, Nest, and its first child, the Nest Learning Thermostat. Last year we reported on a 15-second USB hack that would give hackers full remote controls and access to information on the daily whereabouts of owners.
Even with these findings Grover considered Nest’s Thermostat to be “one of the more secure devices” in his test. It is not the sort of title that would instill confidence in the security of our future technology. So next time you think of making your house a little smarter keep in mind that while some of these devices are smart enough to store your information, they might be missing the part of the brain that keeps it safe from others.
H/T Motherboard | Photo via Nest