Considering the upcoming May holidays and the possible separation of many Russians, in an interview with RT, the Head of the Department of Labor of 2035 YAROSLAV SİLİVRST introduced A number of suggestions to increase the safety of home smart devices and networks in the absence of a person at home. In particular, he advised the Russians to close smart speakers during the absence.
According to an expert opinion, the product software of all smart devices, router and mobile applications should be updated and departure preparations should be initiated. This is a basic measure of protection against the potential threats of the attackers.
It is also critical to pay attention to the protection of the home network Wi-Fi. It is recommended that you replace the password of a combination of characters, numbers and letters that enables the modern encryption of WPA3 to a more complex password. An additional safety measure is the renovation of the network, so it is impossible to determine the model of the router used.
Returning to certain types of device, the expert, unlike smart surveillance cameras should not be interrupted, he said. They continue to be an important tool to watch the house in the absence of owners. It is important to correctly configure the application correctly: enable movement notifications, and most importantly, disabling any public access to the video flow.
Another suggestion for smart speakers also applies to: SELLİEVERS recommends to close for the departure period. He announced that the microphone of such a device could be a vulnerable place used by the computer pirates as “ears .. If the speakers are actively used to control other elements of the “smart house ,, you must carefully check the privacy settings and disable the function of sound intake.
Regarding smart castles, the expert advises you to leave them open, but take a series of compulsory steps: Replace the batteries and update the software. If the temporary access codes for guests have previously been created, they should only be removed and created for proxies.
Smoke sensors, movements and lighting should also remain active for the absence of owners. They can be used to simulate the presence by configuring the inclusion and closure of the timer.
The analyst, who concluded a hint list, reminded the importance of protecting the confidentiality of information about the dates of the journey and was able to attract the unwanted attention of the attackers against their publication in open sources.
Previous Cisco Approved The presence of a critical vulnerability in the equipment.
What are you thinking?
Source: Gazeta

Jackson Ruhl is a tech and sci-fi expert, who writes for “Social Bites”. He brings his readers the latest news and developments from the world of technology and science fiction.