<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>smart security Archives - Artificial Intelligence</title>
	<atom:link href="https://www.aiuniverse.xyz/tag/smart-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.aiuniverse.xyz/tag/smart-security/</link>
	<description>Exploring the universe of Intelligence</description>
	<lastBuildDate>Mon, 02 Mar 2020 07:18:02 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>
	<item>
		<title>Securing your connected home is great, protecting your identity is essential</title>
		<link>https://www.aiuniverse.xyz/securing-your-connected-home-is-great-protecting-your-identity-is-essential/</link>
					<comments>https://www.aiuniverse.xyz/securing-your-connected-home-is-great-protecting-your-identity-is-essential/#respond</comments>
		
		<dc:creator><![CDATA[aiuniverse]]></dc:creator>
		<pubDate>Mon, 02 Mar 2020 07:18:00 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[cloud service]]></category>
		<category><![CDATA[connected home]]></category>
		<category><![CDATA[F-Secure; Cyber Theft]]></category>
		<category><![CDATA[Human Intelligence]]></category>
		<category><![CDATA[smart security]]></category>
		<guid isPermaLink="false">http://www.aiuniverse.xyz/?p=7160</guid>

					<description><![CDATA[<p>Source: telecoms.com An operator customer&#160;buys&#160;a smart security camera&#160;to monitor&#160;her home.&#160;Savvy about&#160;the dangers of IoT devices, she&#160;connects&#160;the camera to&#160;her&#160;home&#160;WiFi&#160;network, which is protected with&#160;her broadband provider’s smart home security&#160;value added solution.&#160;So far, so good. Her&#160;camera is now protected from malicious traffic. But that’s not necessarily the end of the story. It’s well known that smart devices are <a class="read-more-link" href="https://www.aiuniverse.xyz/securing-your-connected-home-is-great-protecting-your-identity-is-essential/">Read More</a></p>
<p>The post <a href="https://www.aiuniverse.xyz/securing-your-connected-home-is-great-protecting-your-identity-is-essential/">Securing your connected home is great, protecting your identity is essential</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Source: telecoms.com</p>



<p>An operator customer&nbsp;buys&nbsp;a smart security camera&nbsp;to monitor&nbsp;her home.&nbsp;Savvy about&nbsp;the dangers of IoT devices, she&nbsp;connects&nbsp;the camera to&nbsp;her&nbsp;home&nbsp;WiFi&nbsp;network, which is protected with&nbsp;her broadband provider’s smart home security&nbsp;value added solution.&nbsp;So far, so good.</p>



<p>Her&nbsp;camera is now protected from malicious traffic. But that’s not necessarily the end of the story.</p>



<p>It’s well known that smart devices are vulnerable to hacking, due to a manufacturing cycle that prizes speed to market over getting the details of security right.&nbsp;Hence the need for smart home security solutions&nbsp;like F-Secure&nbsp;SENSE,&nbsp;conveniently&nbsp;available&nbsp;via&nbsp;broadband providers.</p>



<p>But the cloud services used to manage&nbsp;IoT devices&nbsp;are not necessarily secure either, putting consumers’ private photos, video feeds, personal information&nbsp;and other data&nbsp;potentially at risk in the event of a hack.</p>



<p><strong>IoT cloud service breached</strong></p>



<p>In late December, smart camera maker&nbsp;Wyze&nbsp;announced it had been hit by a data breach. The company confirmed&nbsp;that&nbsp;databases storing the information of millions of customers&nbsp;had been&nbsp;left&nbsp;exposed&nbsp;on the internet for weeks.&nbsp;The compromised data included email addresses, camera nicknames,&nbsp;Wi<s>–</s>Fi&nbsp;names,&nbsp;gender,&nbsp;health data&nbsp;such as&nbsp;weight,&nbsp;and information on the users’&nbsp;Wyze&nbsp;devices.</p>



<p>Wyze&nbsp;attributed the breach to&nbsp;an&nbsp;employee error.&nbsp;The company&nbsp;warned customers&nbsp;to watch out for phishing attempts and spam, as&nbsp;their email addresses may have leaked to third parties.</p>



<p>It’s the bitter truth about cyber security today:&nbsp;Even if you take all the proper precautions to protect your devices and accounts from compromise,&nbsp;you still&nbsp;have no control over how&nbsp;well&nbsp;the cloud services&nbsp;behind those devices&nbsp;protect&nbsp;your data.&nbsp;As we have seen over and over in the news headlines, too often, when it comes to security, these cloud services fail&nbsp;us.</p>



<p><strong>The&nbsp;ID theft&nbsp;risk is real</strong></p>



<p>When consumer data is publicly exposed, the threat of identity theft looms larger.&nbsp;Often,&nbsp;victims are&nbsp;unaware for months, or even years, before the results of a compromised identity become apparent.&nbsp;Nearly 32% of breach victims&nbsp;back&nbsp;in 2016 later experienced identity fraud, compared to just 2.8% of individuals not notified of a data breach in 2016, according to Javelin Research.</p>



<p>An attacker can exploit any bit of personal information to try to monetize&nbsp;in some way. If encrypted password hashes&nbsp;are&nbsp;exposed, attackers will set about using automated tools to convert them to plain text&nbsp;so they can&nbsp;try them out on various services&nbsp;along with associated usernames. In the case of the&nbsp;Wyze&nbsp;breach, emails were exposed, giving attackers an opportunity to target live email accounts with phishing messages that would trick&nbsp;users&nbsp;into giving up their passwords.&nbsp;The goal: Account takeover, and attackers will try&nbsp;to get into as many accounts as possible.</p>



<p>With one compromised password, attackers can use automation to credential stuff their way into other accounts.&nbsp;Once an attacker obtains access to an account, he or she can assume the role of account holder. That means taking advantage of the account’s privileges&nbsp;by performing&nbsp;bank transfers, making credit card purchases online, transferring loyalty points,&nbsp;and so on. The attacker can also&nbsp;gather as much personal info&nbsp;on the&nbsp;victim&nbsp;as possible, to lead to other forms of ID theft. And he or she can&nbsp;change the account password, locking out the rightful account owner and ensuring the attacker’s ability to access it.</p>



<p>Victims of identity theft report damage in various areas of their lives: Stress and anxiety while trying to get the problem under control; financial impact; and loss of credibility when credit is tarnished.</p>



<p>Consumers are largely aware of the problem: In an F-Secure survey, 7 out of 10 consumers agreed they could likely become a victim of&nbsp;cyber crime&nbsp;or identity theft, while&nbsp;56% are worried about losing their personal information as part of a data breach.</p>



<p><strong>Protect your customers’ identities&nbsp;</strong></p>



<p>That’s why, when it comes to operator value-added services,&nbsp;a smart home security solution like F-Secure&nbsp;SENSE&nbsp;is perfectly&nbsp;accompanied&nbsp;by an&nbsp;identity protection solution.</p>



<p>While&nbsp;SENSE&nbsp;protects all the devices connecting to the home network&nbsp;from malware&nbsp;and&nbsp;viruses and offers parental controls,&nbsp;F-Secure ID&nbsp;PROTECTION&nbsp;adds a layer of security for cloud services. A&nbsp;password manager&nbsp;helps users create&nbsp;and store a&nbsp;strong, unique password&nbsp;for each online service,&nbsp;significantly reducing the risk of&nbsp;account takeovers.&nbsp;<s>&nbsp;</s>ID&nbsp;PROTECTION&nbsp;also monitors&nbsp;for&nbsp;and&nbsp;detects leaked personal information&nbsp;in all corners of the web&nbsp;and dark web,&nbsp;and&nbsp;responds quickly to identity theft threats&nbsp;by alerting the user&nbsp;if their leaked data is found.&nbsp;Consumers are guided through step-by-step instructions if&nbsp;their info is found in a breach.</p>



<p>With ID&nbsp;PROTECTION, operator customers get best-in-class monitoring and alerting. Due to a combination of expert human intelligence and cutting-edge automated scanning technologies, F-Secure has the shortest lead times finding exposed data after a breach, and one of the highest hit rates for email addresses.</p>



<p><strong>An ideal pairing</strong></p>



<p>“F-Secure ID Protection&nbsp;is the perfect complement to our&nbsp;Connected Home Security&nbsp;solution,” says&nbsp;Kristian Järnefelt, Executive Vice President, Consumer Security at F-Secure. “It’s the opposite side of the same coin.&nbsp;Securing your devices and detecting if there are anomalies in your home network is essential, yet it doesn’t protect your data when it ends up in the cloud.&nbsp; By combining human intelligence with dark web scanning, data breaches can be detected everywhere, much faster than it is by services that use dark web scanning alone.”</p>



<p>With both services working together, consumers get full protection for their IoT devices, the cloud services that work&nbsp;to manage these devices, and&nbsp;for&nbsp;their connected home.</p>
<p>The post <a href="https://www.aiuniverse.xyz/securing-your-connected-home-is-great-protecting-your-identity-is-essential/">Securing your connected home is great, protecting your identity is essential</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.aiuniverse.xyz/securing-your-connected-home-is-great-protecting-your-identity-is-essential/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
