Mandatory Two Factor Authentication Coming To Ring Devices

Finally, a smart device manufacturer is taking device security seriously, and that’s great news indeed.

You may recall reading about a serious issue with Ring security systems recently.

The news was that the security issue allowed hackers to commandeer user systems and spy on them.

The hackers were sending the users messages and making disturbing threats about watching them, effectively turning their own systems against them.

In response to those events, Ring has taken the bold step of outright requiring all users to make use of two factor authentication, or 2FA for short. Effective immediately, you will not be able to log into your Ring account without 2FA.

Ring’s President, Leila Rouhi, had this to say about the change:

While we already offered two-factor authentication to customers, starting today we’re making a second layer of verification mandatory for all users when they log into their Ring accounts. This added authentication helps prevent unauthorized users from gaining access to your Ring account, even if they have your username and password.”

Ring’s implementation of 2FA relies on emailing or texting users a six-digit code which must be entered in addition to the standard username and password.

In addition to that, Ring also announced that they’re giving users increased control over the info they share with third-party service providers and will have the ability to opt out of personalized advertising.

Rouhi continues:

Beginning immediately, we are temporarily pausing the use of most third-party analytics services in the Ring apps and website while we work on providing users with more ability to opt-out in Control Center. In early spring, we will provide you with additional options to limit sharing information with third-party service providers.”

These are significant steps that put Ring miles ahead of just about every other smart device manufacturer in business today. While we have a few issues with their implementation, in general, these are good moves that are long overdue. Kudos to Ring for getting serious about device security!

Hacked Ring Devices Are Scaring Customers With Voices

On the Dark Web, there’s a live webcast show called “NulledCast” that few people have ever heard of. It’s pretty popular in Dark Web circles, though.

The premise of the show is this: The hosts will hack the cameras in home security systems and mess with the owners. Ring and Nest are the two most popular targets.

Recently, Ring has been getting the most attention, which has resulted in some of the NulledCast antics bubbling up from the Dark Web and being mentioned in mainstream news media.

The hackers are using recycled/re-used passwords to get access to the devices. The attacks range from annoying to creepy and disturbing.  In one case, the hackers took control of cameras at an animal shelter and using the shelter’s speakers, sent a message to a staffer there bragging about how they had just killed a kitten.

In another recent example, they took control of a Ring device used by a minority family and shouted racial slurs at them.  In still another, the hackers talked to and taunted to a young boy while he was playing video games in his room.

Yet another family was taunted by ghostly voices that suddenly started coming from their features, with the hackers laughing that they could still see the family, even as they began powering the cameras down.  Finally, another recent example included a creepy conversation with an eight year old girl that was instructing her to mess up her room and break her television set.

The people who are on the receiving end of these attacks have a range of reactions from being slightly unnerved to outright terrified, and unfortunately, there’s no end in sight.  Smart devices like most of the home security systems sold today and a raft of other appliances have notoriously poor security, if they have any at all, which is why shows like NulledCast are so easy to produce.  If you use a Ring Device, be aware that someone may be watching.

Adobe Acquired Magento Marketplace Suffers Data Breach

Recently, the Magento Marketplace was acquired by Adobe and suffered a breach that exposed a limited amount of user data to an unknown third party.

When Adobe discovered evidence of the breach, they temporarily shut the marketplace down so they could assess the extent of the breach.  It has subsequently been reopened.

If you’re not familiar with Magento, it is an online repository where users can find extensions, both paid and free, that enhance the capabilities of the e-commerce platform the company is known for.

The investigation into the breach is ongoing. At this point, the company can confirm that the exposed information included  MageID, billing and shipping addresses, phone numbers, user names and email addresses.  Also exposed were the percentages paid to developers who host their extensions on the marketplace.

The company stresses that passwords, payment card information and other detailed financial information was not exposed.  They also report that the security issues that made the breach possible have been corrected.

If your data was compromised, you should have already received a notification from Magento.  The company did not reveal how many users were impacted overall. Although that information may be made available as the investigation into the matter continues.

Since the company confirmed that no passwords were stolen, there’s really nothing for you to do if you use the marketplace. As a precaution, however, you may want to change your password just to be safe.

Overall, Adobe and Magento’s handling of the issue has been good, but this has sadly become standard fare.  A company makes a misstep.  Hackers take advantage.  Users pay the price.  Company apologizes, and then we get a new headline the following week about it happening somewhere else.  Stay vigilant.  It’s your best defense against these kinds of issues, which seem to be increasing in their frequency.

New T-Mobile Data Breach Compromised Customer Info

Recently the US branch of the global telecom company T-Mobile disclosed a security breach that impacted a small percentage of its customer base.

Specifically, the breach revealed certain information belonging to a small number of the company’s prepaid cellphone users.

 

The exposed data included customer names, billing addresses, account numbers, rate plans, plan features and user phone numbers. The company stressed that no payment card information or passwords were compromised.

T-Mobile has contacted and has begun working with law enforcement agencies to further investigate the matter. If you were among the impacted users, you should have already received an SMS today from the company.  If you haven’t received a notification and you’re concerned that you may have been impacted, you can get a definitive answer from T-Mobile by contacting them at privacy@t-mobile.com.

This has been a fairly good year for Telecoms in general.  Other than Sprint’s data breach earlier in the year, this is only the second data breach in 2019 involving a major Telecom company.

As breaches go, this one is quite minor, and odds are quite small that you have been impacted by it.  Again though, if it’s something you’re worried about, the company has made it easy to get peace of mind.  Overall, T-Mobile’s handling of the incident has been better than average. In the weeks ahead as the investigation draws to a close, if there are new details to be learned, the company will no doubt disclose them when and as they are able.

With 2019 rapidly drawing to a close, it seems unlikely that we’ll see a spate of Telecomm data breaches. 2019 is likely to be remembered as a year where the Telecomm companies dodged a bullet. Overall, the total number of data breaches continues to surge higher, a trend which is likely to continue for the foreseeable future.

Hackers Are Already Targeting Disney Plus Accounts

In case you weren’t already aware, Disney recently launched a new video streaming service called Disney+ which has been driving Netflix and other established streaming services crazy with fear and apprehension since it was first announced.

If the early indications are any clue, Netflix has little to worry about, but Disney has their hands full.

Mere hours after the service was launched, complaints started flooding in, and not just on Disney’s website.  Angry customers were taking to Reddit, Twitter, and other social media outlets to complain that their accounts had been hacked the same day they began using them.

As this was happening, hold times at Disney’s support center surged past two hours, which only increased customer frustration.  Worst of all, researchers quickly discovered tens of thousands of Disney+ user account details for sale on the Dark Web, with prices starting as low as $3 per account.

If you were one of the lucky customers who didn’t get your account hacked, your experience with the service still may not have been stellar.  Many users who could get on it had complaints that they were either completely unable to stream the offered content, or that the streaming speeds were so low that the videos were essentially unwatchable.  These reports, however, were largely drowned out and lost in the shuffle given how many users had their accounts hacked on day one.

One thing that’s conspicuously absent from the Disney+ service is a two-factor authentication option.  While this isn’t a magic bullet that would have solved all of the company’s launch day issues, it would have made it significantly more difficult for hackers to disrupt the launch of the service to the extent that they did.

Disney will no doubt survive and recover from the debacle, but as of now, they have a well-deserved black eye over the affair.