Budget doorbell camera manufacturer fixes security issues that left users vulnerable to spying

Eken Group has reportedly issued a firmware update to resolve major security issues with its cheap doorbell cameras that were uncovered by a Consumer Reports investigation earlier this year. The cameras in question pair with the Aiwit app and are sold under a slew of brand names, including Eken, Tuck, Fishbot, Rakeblue, Andoe, Gemee and Luckwolf. During its tests, the watchdog found that the unencrypted cameras could expose sensitive information like home IP addresses and Wi-Fi networks, and allow outside parties to access images from a camera’s feed using its serial number. Now, Consumer Reports says the issues have been fixed — just make sure you update your devices.

Devices from those brands should now reflect a firmware version of 2.4.1 or higher, which would indicate they’ve received the update. Consumer Reports says its own samples got the update automatically, but it can’t hurt to double check in your settings considering the risks (that is, if you haven’t tossed the cameras out already). The publication says it’s confirmed that the update fixes the security problems. Eken also told Consumer Reports that the two doorbell cams it had rated with the “Don’t Buy” label — the Eken Smart Video Doorbell and Tuck Sharkpop Doorbell Camera — have been discontinued.

These doorbell cameras, which were sold on popular ecommerce platforms including Amazon, Walmart and Temu but since appear to have been pulled, also lacked the proper labeling required by the FCC. The company told Consumer Reports it will add these IDs to new products moving forward. Following its tests of the update, Consumer Reports has removed the warning labels from its scorecards.

This article originally appeared on Engadget at https://www.engadget.com/budget-doorbell-camera-manufacturer-fixes-security-issue-that-left-users-vulnerable-to-spying-210705131.html?src=rss

Budget doorbell camera manufacturer fixes security issues that left users vulnerable to spying

Eken Group has reportedly issued a firmware update to resolve major security issues with its cheap doorbell cameras that were uncovered by a Consumer Reports investigation earlier this year. The cameras in question pair with the Aiwit app and are sold under a slew of brand names, including Eken, Tuck, Fishbot, Rakeblue, Andoe, Gemee and Luckwolf. During its tests, the watchdog found that the unencrypted cameras could expose sensitive information like home IP addresses and Wi-Fi networks, and allow outside parties to access images from a camera’s feed using its serial number. Now, Consumer Reports says the issues have been fixed — just make sure you update your devices.

Devices from those brands should now reflect a firmware version of 2.4.1 or higher, which would indicate they’ve received the update. Consumer Reports says its own samples got the update automatically, but it can’t hurt to double check in your settings considering the risks (that is, if you haven’t tossed the cameras out already). The publication says it’s confirmed that the update fixes the security problems. Eken also told Consumer Reports that the two doorbell cams it had rated with the “Don’t Buy” label — the Eken Smart Video Doorbell and Tuck Sharkpop Doorbell Camera — have been discontinued.

These doorbell cameras, which were sold on popular ecommerce platforms including Amazon, Walmart and Temu but since appear to have been pulled, also lacked the proper labeling required by the FCC. The company told Consumer Reports it will add these IDs to new products moving forward. Following its tests of the update, Consumer Reports has removed the warning labels from its scorecards.

This article originally appeared on Engadget at https://www.engadget.com/budget-doorbell-camera-manufacturer-fixes-security-issue-that-left-users-vulnerable-to-spying-210705131.html?src=rss

Google asks court to reject the DOJ’s lawsuit that accuses it of monopolizing ad tech

Google filed a motion on Friday in a Virginia federal court asking for the Department of Justice’s antitrust lawsuit against it to be thrown away. The DOJ sued Google in January 2023, accusing the company of monopolizing digital advertising technologies through “anticompetitive and exclusionary conduct.” Per Bloomberg, Google is now seeking summary judgment to avoid the case going to trial in September as planned.

Attorney General Merrick B. Garland said at the time the lawsuit was first announced that Google “has used anticompetitive, exclusionary, and unlawful conduct to eliminate or severely diminish any threat to its dominance over digital advertising technologies.” The lawsuit alleges that Google controls digital advertising tools to such an extent that it “pockets on average more than 30 percent of the advertising dollars that flow through its digital advertising technology products,” according to a press release from the agency last year.

Google now argues that that the DOJ hasn’t shown that the company controls at least 70 percent of the market, which some previous cases have used as the threshold for qualifying as a monopoly, and that the agency “made up markets specifically for this case,” according to Bloomberg, excluding its major competitors like social media platforms. The company also claims the DOJ’s case goes “beyond the boundaries of antitrust law,” Reuters reports.

This article originally appeared on Engadget at https://www.engadget.com/google-asks-court-to-reject-the-dojs-lawsuit-that-accuses-it-of-monopolizing-ad-tech-183830791.html?src=rss

Google asks court to reject the DOJ’s lawsuit that accuses it of monopolizing ad tech

Google filed a motion on Friday in a Virginia federal court asking for the Department of Justice’s antitrust lawsuit against it to be thrown away. The DOJ sued Google in January 2023, accusing the company of monopolizing digital advertising technologies through “anticompetitive and exclusionary conduct.” Per Bloomberg, Google is now seeking summary judgment to avoid the case going to trial in September as planned.

Attorney General Merrick B. Garland said at the time the lawsuit was first announced that Google “has used anticompetitive, exclusionary, and unlawful conduct to eliminate or severely diminish any threat to its dominance over digital advertising technologies.” The lawsuit alleges that Google controls digital advertising tools to such an extent that it “pockets on average more than 30 percent of the advertising dollars that flow through its digital advertising technology products,” according to a press release from the agency last year.

Google now argues that that the DOJ hasn’t shown that the company controls at least 70 percent of the market, which some previous cases have used as the threshold for qualifying as a monopoly, and that the agency “made up markets specifically for this case,” according to Bloomberg, excluding its major competitors like social media platforms. The company also claims the DOJ’s case goes “beyond the boundaries of antitrust law,” Reuters reports.

This article originally appeared on Engadget at https://www.engadget.com/google-asks-court-to-reject-the-dojs-lawsuit-that-accuses-it-of-monopolizing-ad-tech-183830791.html?src=rss

Some Apple users say they’ve been mysteriously locked out of their accounts

Something is up with Apple ID this weekend. As reported by 9to5Mac, Apple users started complaining online last night that they’d been logged out of their Apple IDs on all of their devices without explanation. Upon trying to log back in, some say they were locked out of their accounts despite entering the correct details, and had to reset their passwords. Engadget has reached out to Apple for more information.

Apple hasn’t said anything publicly about what’s going on, and its System Status page makes no mention of problems with Apple ID or any other systems in the last 24 hours. In a Mastodon post spotted by The Verge, one person said Apple support told them only that “sometimes random security improvements are added to your account.” It’s unclear how many users have been affected, though people have piled onto social media threads about the issue to say they’ve experienced it too. According to 9to5Mac, some of the publication’s own team have run into the problem.

While the issue seemed to have heightened on Friday night, there have been sporadic reports of similar problems in the recent past. Software developer Michael Tsai published a blog post about the latest incident and referenced a time just last fall when the same thing happened.

This article originally appeared on Engadget at https://www.engadget.com/some-apple-users-say-theyve-been-mysteriously-locked-out-of-their-accounts-162739339.html?src=rss

Some Apple users say they’ve been mysteriously locked out of their accounts

Something is up with Apple ID this weekend. As reported by 9to5Mac, Apple users started complaining online last night that they’d been logged out of their Apple IDs on all of their devices without explanation. Upon trying to log back in, some say they were locked out of their accounts despite entering the correct details, and had to reset their passwords. Engadget has reached out to Apple for more information.

Apple hasn’t said anything publicly about what’s going on, and its System Status page makes no mention of problems with Apple ID or any other systems in the last 24 hours. In a Mastodon post spotted by The Verge, one person said Apple support told them only that “sometimes random security improvements are added to your account.” It’s unclear how many users have been affected, though people have piled onto social media threads about the issue to say they’ve experienced it too. According to 9to5Mac, some of the publication’s own team have run into the problem.

While the issue seemed to have heightened on Friday night, there have been sporadic reports of similar problems in the recent past. Software developer Michael Tsai published a blog post about the latest incident and referenced a time just last fall when the same thing happened.

This article originally appeared on Engadget at https://www.engadget.com/some-apple-users-say-theyve-been-mysteriously-locked-out-of-their-accounts-162739339.html?src=rss

Proton Mail’s paid users will now get alerts if their info has been posted on the dark web

Proton Mail has introduced Dark Web Monitoring for its paid users, which will keep them informed of breaches or leaks they may have been affected by. If anything's been spotted on the dark web, the feature will send out alerts that include information like what service was compromised, what personal details the attackers got (e.g. passwords, name, etc.) and recommended next steps. At launch, you’ll have to visit the Proton Mail Security Center on the web or desktop to access these alerts, but the company says email and in-app notifications are on the way.

An example of a breach alert from Proton Mail
Proton

Dark Web Monitoring is intended to be a proactive security measure. If you’ve used your Proton Mail email address to sign up for a third-party service, like a social media site, and then hackers steal user data from that service, it would let you know in a timely manner if your credentials have been compromised so you can take action (hopefully) before any harm is done. It seems a fitting move for the service, which already offers end-to-end encryption and has made privacy its main stance since the beginning. Dark Web Monitoring won’t be available to free users, though.

“While data breaches of third-party sites leading to the leak of personal information (such as your email address) can never be entirely avoided, automated early warning can help users stay vigilant and mitigate worse side effects such as identity theft,” said Eamonn Maguire, Head of Anti-Abuse and Account Security at Proton.

This article originally appeared on Engadget at https://www.engadget.com/proton-mails-paid-users-will-now-get-alerts-if-their-info-has-been-posted-on-the-dark-web-100057504.html?src=rss

Tesla makes its controversial Full Self-Driving software cheaper by $4,000

Tesla has reduced the price of its Full Self-Driving software in the US and Canada. Per a post from the company on X, it now costs $8,000 in the US (or $11,000 for buyers in Canada) to add the so-called Full Self-Driving (FSD) Capability. This is down from $12,000 ($16,000 CAD), according to Electrek, which also reports that Tesla has discontinued the $6,000 Enhanced Autopilot option. Current owners with that package can upgrade to FSD for $2,000.

Tesla’s driver assistance features have been under scrutiny from regulators for years, and despite the name, Full Self-Driving isn’t meant to fully take over for a human driver at this stage. On its website, Tesla notes that current FSD features “require active driver supervision and do not make the vehicle autonomous.” In March, the company reportedly introduced a mandate requiring its staff to give buyers a demonstration of FSD before they’re able to take home their new cars, so they can see what the software has to offer.

The latest price drop comes a few days after Tesla slashed the monthly cost of its subscription for FSD — which it has recently been referring to as Full Self-Driving (Supervised). The subscription, which previously cost $199/month, now goes for $99/month. Tesla also cut the starting prices of its Model Y, X and S vehicles this weekend by $2,000 each. Earlier this month, Tesla reported that its vehicle deliveries for Q1 2024 fell short of expectations, with an eight percent drop year-over-year.

This article originally appeared on Engadget at https://www.engadget.com/tesla-makes-its-controversial-full-self-driving-software-cheaper-by-4000-184737580.html?src=rss

Biden signs bill to reauthorize FISA warrantless surveillance program for two more years

President Biden this weekend signed into law a bill that reauthorizes a controversial spying program under the Foreign Intelligence Surveillance Act (FISA). Section 702 of FISA, which has now been extended for two more years, allows for warrantless intelligence gathering on foreign targets. While its focus is on the communications of targets located outside the US, that includes any exchanges with people stateside, meaning Americans’ records can get swept up in these collections too.

The Senate vote on reauthorizing Section 702 came down to the wire. It was set to expire on Friday at midnight, but was recently given an extension until April 2025, according to The New York Times, lest it lapse while disagreements over proposed amendments dragged on. Section 702’s extension period was also shortened, cutting it down to two years instead of the previous five. Congress did ultimately miss the deadline on Friday, but it passed with a 60-34 vote, CBS News reported. The White House issued a statement not long after saying the president “will swiftly sign the bill into law.”

Section 702 was first signed into law in 2008 and has been renewed twice already, allowing US intelligence agencies to use data from internet and cell phone providers without a warrant to keep tabs on foreign targets’ communications. It’s faced strong opposition from both sides over its implications for Americans’ privacy. Kia Hamadanchy, senior policy counsel at the American Civil Liberties Union (ACLU), called the passage of the bill “profoundly disappointing” in a statement released over the weekend, going on to say that it “gives the government more ways to secretly surveil us — with little power to hold spy agencies accountable.”

“Senators were aware of the threat this surveillance bill posed to our civil liberties and pushed it through anyway, promising they would attempt to address some of the most heinous expansions in the near future,” Hamadanchy said. “We plan to make sure these promises are kept.”

Update, April 21 2024, 1:21PM ET: This story has been updated to include a statement from the ACLU.

This article originally appeared on Engadget at https://www.engadget.com/biden-signs-bill-to-reauthorize-fisa-warrantless-surveillance-program-for-two-more-years-153817277.html?src=rss

House votes in favor of bill that could ban TikTok, sending it onward to Senate

The US House of Representatives passed a bill on Saturday that could either see TikTok banned in the country or force its sale. A revised version of the bill, which previously passed the House in March but later stalled in Senate, was roped in with a foreign aid package this time around, likely meaning it will now be treated as a higher priority item. The bill originally gave TikTok’s Chinese parent company, ByteDance, six months to sell the app if it’s passed into law or TikTok would be banned from US app stores. Under the revised version, ByteDance would have up to a year to divest.

The bill passed with a vote of 360-58 in the House, according to AP. It’ll now move on to the Senate, which could vote on it in just a matter of days. Senate Majority Leader Chuck Schumer said today that the Senate is working to reach an agreement on when the next vote will be for the foreign aid package that the TikTok bill is attached to, but it is expected to happen this coming Tuesday. President Joe Biden has previously said he would support the bill if Congress passes it. 

The bill paints TikTok as a national security threat due to its ties to China. There are roughly 170 million US users on the app, at least according to TikTok, and ByteDance isn't expected to let them go without a fight. In a statement posted on X earlier this week, the TikTok Policy account said such a law would “trample the free speech rights” of these users, “devastate 7 million businesses, and shutter a platform that contributes $24 billion to the U.S. economy, annually.” Critics of the bill have also argued that banning TikTok would do little in the way of actually protecting Americans’ data.

This article originally appeared on Engadget at https://www.engadget.com/house-votes-in-favor-of-bill-that-could-ban-tiktok-sending-it-onward-to-senate-185140206.html?src=rss