Written by Gabrielle Ladouceur Despins, writer at WeLiveSecurity-ESET
The final stretch of 2018 approaches. For parents of young children, this means that lunch boxes and homework are back. It is also the season, for many of us, when trees start to change color before the arrival of the cold season. It is also the time when entertainment companies try to entice viewers back to the sofa to discover what new treats they have in store.
Your couch is ready, you’ve possibly stocked up on popcorn, and maybe you’ve invited friends to celebrate the return of your favorite show. But have you thought about securing your connected TV (Smart TV)? Smart TV, like all connected devices, can present various types of threats, including the risk of having your conversation recorded and using security vulnerabilities that can allow attackers to take control of your device.
We have published several articles in the past on the security of connected devices. In the meantime, here are some steps you can take to use your Smart TV more safely:
1 – Protect your router credentials
To take advantage of the technology of connected televisions, the use of the router is a very popular avenue, due to its practicality and the flexibility it offers. This device allows you to connect several devices to your network, without using a large number of cables, which would reduce the versatility of IoT devices.
However, a router that hasn’t yet been secured could put your Smart TV and your entire network at risk. For example, a Man-in-the-Middle (MITM) attack could allow a criminal to install malware on your Smart TV. To achieve this, the cybercriminal needs to have access to your network. Access to your network – which the attacker will have, if s/he has your Wi-Fi , or has otherwise hacked into your router.
To ensure the security of your router, the admin username, along with the provided password should be changed, if you haven’t already done so! It really is the first step you should take. Make sure you use a strong and unique username and password. In order to prevent access to your network without your consent, you should also make sure to disable any features you do not use, such as any features you are not using that could facilitate access to your network without your consent.
Also, always make sure to update your router, if and when such an update is available, as well as all your connected devices, to be protected against newly discovered and fixed vulnerabilities. If you need to purchase a new device, you should look for a device that complies with and supports the new WPA3 protocol. You will find several other tips in this blog article.
2- Sort your networks and devices
Many devices are probably linked to your router. A good practice for securing your home network is to list devices and create separate networks with custom permissions to better protect the most sensitive devices. Viewing the list of devices will allow you to turn off those you do not use or no longer use. This step will make it easier to detect an intrusion attempt, since you will already be familiar with the names of devices using your network.
The creation of a separate network offers other advantages. For example, you may decide to separate sensitive devices such as surveillance cameras, storage devices or home automation devices from the rest of your connected devices, including your Smart TV, to avoid the risk of breaches. You can also choose to share only certain devices with your guests at home.
3- Configure your Smart TV
Just like all your connected devices – and your router – your Smart TV must be properly configured to ensure security and functionality. If the features vary from device to device, check the manual. First, make sure you configure the privacy settings and information you allow your provider to collect – or share with third parties. Several Smart TV vendors have found themselves in the spotlight for collecting a great deal of information from their customers – including voice recordings. To prevent this, and other possible violations, make sure you configure your router’s settings for both privacy and the information you allow your provider to collect – or share with third parties.
If your Smart TV also includes a camera, remember that it too can put your privacy at stake. Cybersecurity researchers have identified attacks where Smart TV cameras were accessed via the internet. Once again, caution should be exercised. Turn off the camera when not in use. You can even place a piece of tape on the lens, to prevent anyone from getting in and watching you even when your Smart TV is off.
Remember also that any enabled features may pose a risk. Indeed, uncorrected loopholes in them can serve as an opening through which cybercriminals can sneak in. So remember to disable the features you are not using. Even if it means reactivating them in the future, if you wish to use them.
Also think about adjusting the configuration of protection measures offered by the provider, updates – we will come back to this below – and, if necessary, parental control! Most of today’s devices are equipped with user-friendly graphical interfaces, so it only takes a few minutes to properly protect you.
4- Install the latest updates
Criminals are always looking for new vulnerabilities that they can use to infiltrate their victim’s device, network or computer. A vulnerability is an exploitable weakness in an application that makes it possible to perform an unwanted or wrong action that cybercriminals can use to attack your devices. Connected devices, like your Smart TV, have firmware. Like all computer systems, Smart TV firmware must be regularly updated so that you have all the patches in place, especially to avoid bugs and vulnerabilities.
Unlike your computer’s operating system or smartphone, most Internet of Things (IoT) devices do not update firmware automatically. However, many IoT devices offer you the option to put the firmware directly into your console, which makes your task easier. If not, you must download and install the updates yourself. In both cases, you then have to install the updates if applicable.
5- Use a complete security solution
Like your computer or mobile phone, your smart devices can be infected with malware or other threats created by cybercriminals. You should therefore use a complete security solution from a trusted provider to protect these devices as well. There are several options, including ESET Smart TV security available on Google Play Store, that offers you real-time protection against viruses and ransomware, in addition to automated virus database updates. Test some of these products as they usually offer you a trial period. When you find the one that suits your needs we strongly suggest you secure your Smart TV with it.
6- Download applications with caution
We often discuss this issue of malicious applications and potentially unwanted applications (PUAs) on WeLiveSecurity. And with good reason! Malware and PUAs are a major problem: in 2017 Google removed approximately 2000 applications per day that violated its policies.
Banking Trojans, fake security applications, paying applications pretending to be legitimate free applications, or malicious software disguised as games or legitimate applications — cybercriminals have numerous tactics up their sleeves. Malicious applications can also affect your Smart TV so, as with any other device, you should take special care with the applications you download to it.
The first advice is of course to always download applications directly from the Google Play store or the App Store. Always check the name of the software author, the number of installations and other users’ evaluations before downloading an application. If in doubt, wait before installing an application that you think might be questionable.
7- Use streaming with caution
Now that your devices themselves are secure, remember that your web browsing is also a preferred entry point for cybercriminals. Attackers do use streaming sites to deliver various types of threats, ranging from social engineering campaigns to malicious code downloads, cryptojacking and potentially unwanted Applications (PUAs). Choose the streaming sites you consult with caution. Actively search for and use reliable and legitimate websites for online viewing.
Now that you have implemented these measures to improve the security of your Smart TV, you can sit back and enjoy the upcoming season safely. However, remember that IT security is not limited to individual actions taken on a specific date. Keeping your Smart TV and connected devices safe requires continuous effort and monitoring.
Be sure to implement these security measures and review your cyber security practices in IoT regularly. This way, you can not only enjoy the next season of your favorite shows but can continue to use all your connected devices safely, including in coming seasons.
Is Apple’s New ‘NameDrop’ Feature a Cause for Parental Concern?
In the ever-evolving landscape of technology, Apple’s new iOS 17 update has introduced a feature that’s sparking a mix of curiosity and concern: NameDrop. This functionality allows users to share contact information with others seamlessly, but it’s not without its set of caveats and considerations.
At the core of the apprehension is the proximity-based nature of NameDrop. For the feature to work, both devices must have iOS 17 installed, be unlocked, and be in close physical proximity – a touch is required to initiate the contact transfer. The user experience involves a swift interaction, prompting a screen at the top of the device with options to “receive only” or “share.”
The need for consent is emphasised in this process. Both users must actively participate in the transfer, acknowledging and approving the exchange of contact information. This deliberate approach is aimed at ensuring that the sharing of personal data is a conscious and intentional act.
However, the rollout of NameDrop has not been without its share of concerns, particularly among parents and law enforcement agencies. Police departments across the United States have issued warnings, urging parents to manually disable the feature on their children’s devices. The fear, it seems, is rooted in the potential for unintended consequences, especially considering the close physical interaction required.
Is it wise to err on the side of caution and turn off NameDrop? Perhaps. Is it time to hit the panic button? Not necessarily, according to experts in the field. In a report by The Washington Post, Chester Wisniewski, a digital security expert at Sophos, dismisses the concerns surrounding NameDrop as “hysteria” and “nonsense.” He suggests that Apple has implemented safeguards to prevent inadvertent information sharing.
One key aspect that should offer reassurance is the need for mutual consent and the deliberate physical proximity required for the feature to activate. The intentionality of this process is to eliminate the risk of accidental data exchanges, putting control firmly in the hands of the users.
As with any technological advancement, understanding and awareness play pivotal roles in ensuring a positive user experience. Educating users, especially parents and guardians, about the intricacies of NameDrop can empower them to make informed decisions about its use. Apple, being at the forefront of user privacy and security, is likely to continue refining and enhancing the feature based on user feedback and evolving security standards.
While the warnings from law enforcement underscore the importance of vigilance, it is crucial to approach the situation with a balanced perspective. The benefits of a feature like NameDrop, enabling seamless contact sharing in a world where connectivity is key, should not be overshadowed by fear.
Apple’s NameDrop feature introduces a novel way of sharing contact information, but its success hinges on user awareness and responsible usage. As technology continues to evolve, so too will the safeguards and features aimed at ensuring a secure and positive user experience. By staying informed and engaged, users can navigate the landscape of advancements like NameDrop with confidence.
Password Management: Creating, Storing, and Managing Secure Passwords
Navigating the complexities of online security begins with effective password management. This article aims to provide practical advice on creating, storing, and managing passwords, ensuring your digital safety with an approach that is both informative and user-friendly.
Crafting Unbreakable Passwords: A Practical Approach
Creating a strong password is more than a security step; it’s a necessity in today’s digital world. Follow these guidelines to enhance your security:
- Length Matters: Passwords should be at least 16 characters long. A study by Carnegie Mellon University found that longer passwords significantly reduce the risk of hacking.
- Complexity is Key: Combine different character types for a robust password. Use a blend of upper and lower case letters, numbers, and symbols.
- Memorable Phrases: Create passwords using unusual phrases or sentences. Think “VanGoghStarry1Night!” instead of “Password123”.
The Importance of Diversifying Passwords
Using the same password for multiple accounts is like having one key for every lock. Diversify your passwords to ensure that a breach in one account doesn’t jeopardize others. According to a report by Verizon, 80% of hacking-related breaches are due to weak or stolen passwords.
Multi-Factor Authentication (MFA): Your Safety Net
Incorporating MFA can significantly increase your account security. This method, which often involves receiving a code on your mobile device, adds an extra layer of protection.
Personal Information: The Password Pitfall
Avoid using easily guessable personal information in your passwords. Cybersecurity experts warn that personal details are often exploited by hackers.
Password Managers: The Organizational Tool
A password manager is a secure and practical way to store and manage passwords. These tools also help in generating strong passwords. Consider options like LastPass, KeePass, or Keeper, based on your personal preference and needs.
Regular Updates: Key to Continuous Protection
Regularly updating your passwords can dramatically reduce your vulnerability to cyber attacks. Cybersecurity experts recommend changing passwords every three to six months.
Stay Informed: Your Best Defense
Staying updated with the latest cybersecurity trends and threats is essential. Never share your passwords, and always be alert to phishing attempts.
Embracing Secure Password Recovery Methods
Secure Password Recovery: It’s essential to establish secure methods for password recovery. Cybersecurity experts advise against using easily guessable security questions. Instead, opt for two-factor authentication or a secondary email for recovery. According to a report by Google, this simple step can prevent 100% of automated attacks.
The Role of Biometrics in Password Security
Biometrics Integration: The use of biometrics (like fingerprint or facial recognition) in conjunction with traditional passwords is becoming increasingly popular. This method, known as biometric authentication, adds an extra layer of security. A study by the University of Michigan showed that biometrics could reduce the time spent on password entry by 78%, enhancing both security and convenience.
Navigating Public Wi-Fi and Password Safety
Public Wi-Fi Risks: Be cautious when entering passwords on public Wi-Fi networks. These networks are often unsecured, making them hotspots for cybercriminals. The Federal Trade Commission suggests using a VPN (Virtual Private Network) to encrypt your internet connection in such scenarios. Additionally, services like Cisco Umbrella can provide an extra layer of security by offering internet gateway protection. This service not only secures your connection but also helps in blocking malicious sites and phishing attempts, making it a valuable tool for anyone frequently using public Wi-Fi.
The Evolution of Passwords: Future Trends
Future of Passwords: Stay abreast of evolving technologies in password security. Innovations like single sign-on (SSO) systems and blockchain-based passwords are shaping the future of digital identity management. A survey by TechCrunch indicated that 65% of tech professionals believe traditional passwords will be obsolete in the next five years.
Educating Others: Spreading Password Safety Awareness
Spreading Awareness: Educate family, friends, and colleagues about password safety. Sharing knowledge and best practices can dramatically reduce the collective risk of data breaches. The National Cyber Security Centre reported that promoting basic password hygiene could prevent up to 80% of common cyber attacks.
Tailoring Your Password Strategy
Remember, password management is not one-size-fits-all. Consider your unique digital habits and needs when implementing these strategies. Personalization is key to effective password management.
In the intricate web of digital security, password management plays a vital role. By embracing advanced recovery options, considering biometric solutions, exercising caution on public networks, keeping pace with technological trends, and sharing knowledge, we can fortify our digital defences. Effective password management is not just about creating strong passwords; it’s about adopting a comprehensive approach to digital safety, tailored to our unique needs and the evolving cyber landscape.
Levelling Up Your PC Game Marketing to Capitalise on the MENA’s Gaming Boom
By Adam Smart, Director of Product – Gaming, AppsFlyer
The Middle East and North Africa (MENA) is home to the world’s fastest-growing gaming market — an estimated 377 million players, which is more than all of Europe combined (386 million) and considerably more than the US (210 million). Gamers in Saudi Arabia, Egypt, and the United Arab Emirates (UAE) combined have topped 65 million by 2021 and this number is predicted to reach almost 86 million by 2025. MENA gaming revenue is set to reach more than US$5 billion by 2025. In the UAE, where nine in every 10 adults say they play video games, the country’s gaming market is expected to reach more than $306 million this year.
One segment that has been growing consistently is PC and console gaming. As the growth has occurred, the PC gamer has evolved. No longer exclusively the domain of World of Warcraft aficionados brandishing their “l33t” statuses in front of hordes of “noobs”, the PC market is more diverse, and therein lies the opportunity. First, we have to temper the excitement by reminding you that enthusiasm is no substitute for strategy. Paid and organic moves must combine in a journey of iteration and learning. Hype must be built patiently, in four steps.
Pick Your Genre
You start out with a dream. You want to learn. You want your game to be played. So, the first thing you will do is determine — through research on marketplaces like Steam — what your best positioning is. What genre should your game inhabit to give you the best chance of momentum? Your genre will determine your competition and revenue potential. Each genre releases different numbers of games and has different sales volumes and average revenues per user (ARPU).
Consider a less competitive genre to start with, so you can build some revenue before embarking on more ambitious projects. Consider what kind of streamers play in this genre and how your game’s art style and vibe may fit their tastes. And get to know where your audience consumes content — Twitch, YouTube, TikTok, or others.
Get to Know Steam
Steam is the largest gaming marketplace, where visibility and downloads play out a little differently to Google Play or the App Store. Standing out among 50,000 other games and drawing players from among 130 million monthly active users is a daunting goal. Make sure you pay attention to your capsule (the hero image that represents you in the store). An attractive, professional design is more likely to pique interest. Next, craft your landing page to be a polished artefact that intrigues and inspires browsing — great imagery, short trailers, and lots of gameplay footage. And tag your game to ensure discovery. Steam is known for its window shoppers, so make sure they can add your game to their wish lists. This is a great marketing tool, an effective social wedge, and a sustainable driver of sales.
Leverage UA Channels
As an indie developer, signing with a publisher can help a lot with marketing, especially if your budget is tight. You can also get the word out through alpha and beta releases. Apart from hype, this is a way to keep your most loyal players engaged. Use tools like Sullygnome, Playboard, or HYPR to find well-known gamers/streamers. Many streamers made the difference for games once they started playing them on Twitch. Also check out online festivals like GDC, PAX, Tiny Teams, and Summer Game Fest to further build awareness. And if you have the budget, look into Meta ads, Twitch ads, and YouTube ads.
Find out which platforms host your potential gamers. Engage with them wherever they are. Run your campaigns on channels with which you are familiar, such as mobile and Web. Do not rule out CTV (connected TV) ads or offline ads to capture interest at bus stops and metro stations.
Measure and Optimise
By this point, you will have built a hype train. Now, you must measure its efficiency. You need to know your most profitable campaigns and channels and to do this, you need to measure and attribute conversions accurately. This is not easy in the multichannel haze in which the modern consumer dwells. A gamer could have spotted a Tweet, then watched a CTV ad, then a mobile ad, and then been confronted with a billboard. Which drove their conversion? Today’s marketing measurement and analytics solutions, backed by the right partner, can help organisations connect these dots to the purchase of your game. These platforms even offer a real-time view of campaigns’ performances across multiple channels and devices — a critical capability for branching out to sell games on consoles.
You Just Levelled Up
PC and console gaming sales are a world apart from mobile markets. But provided you understand the target genre and make the right moves on Steam (including wish lists), you should be in the necessary visibility bracket to take your campaign to the next level. Get social, plug yourself into the channels where your target gamers can be found. Enlist a publisher, dole out alpha and beta launches, and cosy up to celebrity gamers/streamers. Be seen at online festivals, spend (if possible) on Meta Ads, Twitch, and YouTube, and consider cross-platform campaigns across mobile, CTV, offline, and Web. But most importantly, measure. And through measurement, as the gamers say, “GiT GuD”.
TOZO HT2 ANC Wireless Headphones Review: Affordable Excellence in Sound and Comfort
At Gadget Voize, we’ve previously reviewed a couple of TOZO audio products such as the Golden X1 Wireless Earbuds and...
Review: Sennheiser AMBEO Soundbar Mini
The Sennheiser AMBEO Soundbar Mini is a compact yet powerful soundbar, offering an expansive and meticulously detailed audio experience. The...
HONOR Magic V2 Review: Redefining Foldable Excellence
The HONOR Magic V2 has emerged as a groundbreaking foldable smartphone, marking the third generation of excellence from Honor and...
GameSir G8 Galileo Mobile Gaming Controller Review: Elevating Mobile Gaming with Precision and Performance
Mobile gaming has become a powerhouse in the gaming industry, thanks to the increasing capabilities of smartphones. However, one common...
Video: The HUAWEI MatePad Pro 13.2″ – A Beautiful Tablet That Inspires You to Create
The HUAWEI MatePad Pro 13.2″ is the first tablet in the industry to feature a large-size flexible OLED screen. It...