If you use this popular safety system, replace immediately

Recently discovered vulnerabilities have disappeared not fixed by the manufacturer.


Your home must always be a comforting and inviting space for you and your loved ones, but it should also be the place where you feel safer. Fortunately, over the last decade, new technologies have made it easier than ever to set up protection with easy-to-install cameras, smart locks and monitors that can even allow you to keep an eye on your property from a distance. But if you have a popular home security system, two recently discovered vulnerabilities can be endangered. Continue reading to see which product you can replace for security reasons.

RELATED:If you get this Amazon message, do not open, WARN Experts.

The S03 Fortress Security System has two important vulnerabilities that could be endangered.

A woman standing in her living room using a tablet to control her home security system
Refuge

If your home is equipped with theS03 Fortress Security SystemInadvertently, you can put your safety in danger. According to the Rapid7 cyber safety company, a pair of major vulnerabilities allows potential intruders to disarm the system using relatively simple tactics.

The company says firstdiscovered security faults Three months ago and made contact with the fortress on potential risks, TechCrunch reports. Rapid7 Publicly information on vulnerabilities published after Fortress did not respond to the messages and saw the only awareness raising was closed a support ticket.

Cybernetic security experts say the security system can be disarmed using the e-mail address of an owner.

a hacker doxing someone online
Refuge

According to Rapid7, the S03 system fortress is based on a Wi-Fi connection to maintain its motion detectors, cameras and sirens and allow customers to check their homes with a mobile application. It also uses a radio controlled FOB key to put the system under and off each time to come or go from their property.

However, the cyber security company found that the system is based on the unauthenticated API, allowinghackers or criminals for access Unique Number International Identity of Mobile Equipment (IMEI) Specific Devices Simply know the e-mail address associated with an account. This then allows them to arm or disarm the system remotely, TECHCRUNCH reports.

RELATED:If you see this message on your iPhone, Do not Click IT, Warn Experts.

A vulnerability with gussets can also be exploited to disarm the system easily.

white male burglar holding crowbar and wearing hoodie peering through window of house
Shutterstock / Andrey_Popov

But a potential intruder can not even needKnow your personal e-mail address To access your home. Rapid7 said it also has the gussets of this system using non-encrypted radio signals to arm and disarm, which makes relatively easy for someone to pick up frequencies and replay them to get away to close down the system .

While the process of drinking a radio frequency may seem high, an expert warns that this can be done relatively easily with the right to know-how. "The attacker must be both reasonable conversant in DTS to capture and replay the signals and be at reasonable radio"TOD BEARDSLEY, Director of Research at Rapid7, says ThreatPost. "What is worn will depend on the sensitivity of the gear used, but in general this kind of clandestine listening requires the line of sight and quite close-face or so. »

By using a specified e-mail address could help you stay away from someone to access your devices.

man fiddling with smart home security system on a tablet
Refuge

In the end, the experts say it is unlikely that a random intruder will be able to use vulnerabilities in the system. "The probability of exploitation of these questions is quite low," said Beardsley ThreatPost. "An opportunistic home invader does not risk being an expert in cybersecurity, after all. However, I am concerned about a scenario in which the attacker already knows the victim, or at least enough to know their e-mail address, which is all that is really necessary to disable these devices on the Internet ".

Beardsley admits that "very little" can be done on easily exploitable gussets, except to avoid using products related to the fortress. But there is still a way that you can avoid having your system operated by someone using your e-mail address. "We suggest you register the device with a secret, once using the email address that can operate as a kind of low password," said Beardsley ThreatPost. "In the absence of an authentication update of the seller, I feel like this is a good solution. »

RELATED: If you hear when you answer the phone, hang up immediately .


Categories: Smarter Living
Tags: Home / News / Safety
11 large catering chains that have deposited for bankruptcy
11 large catering chains that have deposited for bankruptcy
6 secrets to make a perfect homemade pizza
6 secrets to make a perfect homemade pizza
The 8 best cruises to take this winter
The 8 best cruises to take this winter