53 Replies to “Ring cameras HACKED? What you need to know!”

  1. First,
    if you bought a camera to watch over your kids,
    you are a lousy parent.
    Really …

    if you bought anything wireless and thought it would be hacksafe to use, you were and are deluded.
    What did you think would happen with a cheap wireless camera with remote access… huh ?

    The only safe solution is the following:
    dump any wireless camera or any camera that has internet access, which can be accessed from outside of your local are network, no matter how safe it is.

    WIFI is no longer safe, any kid can easily hack it …
    There is no solution to patch WIFI devices, you need to dump the hardware and replace it with new one … then again they will be safe only until the next hack is discovered, after you will have been abused anyway, so … yeah,… Security in tech is only temporary.
    Therefore, don't freaking hook up a camera/microphone with remote access wireless or wired (f you don't want to be spied upon).
    Wired devices are safer, but not fool proof and are only almost safe if correctly setup, which they are mostly not.

    Right now you are being spied upon through your Smart TV… Chinese or not, but certainly Chinese ones. Really .. the remote access in such TV is the feature not the hack.
    Oh by the way, your printer includes a unique hack that identifies every single piece of paper you printed on. Yes, that's not a joke.

    PS: I am computer scientist: There always will be a way into your privacy if you hook up any kind of sensor to the internet.
    There is no escaping it.
    Take risk with your life, if you want to do so, but be wise enough not to do so with your kids.

    security is never absolute, it's always a trade-off of convenience versus risk of being abused.
    So consider this … what level of risk to the safety and security of your kids are you willing to take to gain some convenience for yourself?

    I say ZERO for my kids. So, no internet camera watching anyone.
    Your call for your kids.

  2. It was not a hacker…it was a person that had the person's login information. Just enable two factor authentication and change your passwords regularly. Problem solved

  3. Stories like this are why we need to move beyond passwords for authentication. Unfortunately, I don't see that gaining widespread adoption any time soon.

  4. Firefox Monitor auto-checks these breach databases to see if your Firefox account email exists in these database AND sends notices when new entries are added.

  5. Thank you, again, for a reasoned and informed response to the problem of IoT items being hacked. This is only going to get more common and important as more and more IoT devices are deployed. We are in the early days of using IoT devices, and we are still feeling around for what is a problem and how to address it. This is not a blame game, but rather a responsibility discovery. We are going through the days that establish "expected" or "responsible" behavior. We are establishing what is good behavior for manufacturers and users. Keep up the good work.

  6. Just like meme says: Weve trained people to use passwords that are hard to remember and easy to crack. https://xkcd.com/936/
    Use a password manager and passPHRASES not passwords. (eg https://www.useapassphrase.com/)
    A 3 or 4 word passphrase is as good as imposssible to crack with current tech and easy to remember for the user.

  7. Just watch video how they are hacking scanners from FedEx etc and then keeping you packages
    I had that happen with AT&T when send my warranty phone back now AT&T has my phone and want me pay price cause of this hacker

  8. This makes me wanna stay away from Tor. No matter what you do you can't escape getting hacked.. Some bad people can find you.. And instantly take your data, info. While they're also on Tor, and still find you. And see you.. :0 and release anyone's information..

  9. Thanks Man, signed up for the "haveibeenpwned" site. I had been pwned but I have started using "lastpass" earlier this year.

  10. No… A lot of it is users fault some of it is rings fault.
    Ring didn't put the password in, the user did. We have all been told for years to use unique password but if people choose not too then whose fault is it. Someone people use the same pin numbers on their cards or write down pin numbers. Banks fault or card holders fault?

  11. i almost got evicted, but forbesfamilyweb.net sent $22,000 to my account and saving me for loosing my house, they re genuine and their hack works

  12. Thank you for clearing the air on the truth behind the ring situation. I think a lot of people aren't sure why this happened, because popular media didn't explain it like it should've been told.

  13. This is a prime example of why you don't put cameras in your house. If you put cameras on the outside then there is no reason for them on the inside. Also to come find out the lady didn't have the system secured it was easy to access from another source. All these cases that pop up like this are customer error.

  14. I don't even by laptops with cameras never mind in my house or door bell. People are stupid like the ones that give their DNA to find their family tree. And cameras everywhere are an invasion of privacy to all, not a good thing your a moron.

  15. I love ring products, I’m sorry this happened to such a great product, RING has stopped theft on my property, alerted me when someone was at my home, i even speak to my pets while away, it has helped solve crimes in my neighborhood, when I heard a noise early one morning in my home I checked my camera to find my cat chasing a mouse that he had brought in to play with through the pet door(my camera showed me that also) yes, he killed it but I locked myself in my bedroom for hrs until …RING just works well!!! I am mad, and now I see someone has filed a lawsuit to make RING accountable 🤦‍♀️I checked that site , my 2 email accounts were PWNED, thanks for the wed sit info.

  16. Everyone is blaming it on ring as if its their fault, The families that get hacked are usually the ones that signed up to a LOT of different sites that have no protection against SQL Injections, Once the databases are dumped (Off those sites) they are later checker on Ring and if the passwords match, they are in. Always use a different password.

  17. The news will never say anything bad about ring cause this is apart of the plan. And stop saying it’s cause of the password. A simple laser can unlock smart devices from outside. There is videos on this.

  18. Ring cameras are safe don't let anyone tell you they are not. Just keep your password safe and use a different from your other passwords you use.

  19. Nice tactics: cryptic music, deep vocal tones, and paranoic atmosphere. While you do use fear, paranoid to draw in your users. People really need to use common sense, a stronger, lengthen password with alphanumeric lettering including symbols. How about cut off the music, and speak regularly, but like I said nice tactics to draw in the fear loving crowds. I don't subscribe to your methods, I am not controlled by the same fear you attempt to rebroadcast in your YouTube page. You do have good points, but the other garbage unless their is an agenda I will find you entertaining, and partly educational. I have completely disassembled my ring video camera, and added my other thought out exploits to forward to the Ring technicians, and development department. Have a good day.

  20. I've not seen this anywhere, BUT I had some definite interference and manipulative attacks goings on with 1) Ring Floodlights last summer (they use the Ring Bridge and don't have cameras). The ring wired floodlights (no camera, just wifi floodlights that can be used as standalone. They work with Alexa, and I was using them on Amazon routines. (these are extremely bright lights, and right now, you cannot control the lumens). My lights were being turned on and off randomly when the motion sensor was not activated. Enough so that I could see the pattern. I tried everything I know to duplicate it. I changed the password, and I tried to "hack it" with IR, UV and regular lights. No dice. I suspected a line of sight attack, because I got it to stop when I blocked the line of sight to a neighbor's (teenaged son's) upstairs window. But I was never able to find out for sure how it was done.

    I was keeping them mostly off at the switch because at night they are very bright, and I didn't want to disturb my neighbors. When the hacks came out on the cameras (I had replaced all the Ring cameras because of the issues with the floodlights), I added the 2FA (which I hadn't done previously), and the attacks stopped). I have a friend from church who is electronically quite bright, and he told me that these devices actually operate on two frequencies, one of them 2.4Ghz, and the other 900Mhz (this is called "the Amazon sidewalk"), and it's designed to have Amazon be able to control these devices (all the ones in a neighborhood group).

    I don't see how the 2FA is changing this IF you've already changed the password (which I had), but it appears to have worked. I gave some thought to offering a "finder's fee" to the teenager in my neighborhood who apparently hacked it (how he did it), but thought better of it.

    I think there's more to this story than the public will ever know, and I no longer trust Ring devices because of it. And, in terms of their night vision ability of their cameras (which is what I want), they really kind of stink. I have reolink battery cams (Argus 2) with Starvis night vision that can see 300 feet i color, in nearly 0 light; but the Rings can't see 30 feet even with IR. But the Rings DO have good motion sensing on their cameras, and do work well with Amazon echo devices.

  21. Yeah, let's use a Password Manager and keep all of our usernames and passwords in one place, along with other sensitive personal details that some of them store alongside your passwords. It was found that on Windows 10 machines, many Password Managers, even when locked, were about as secure as storing passwords in a text file. In some circumstances, the master password was residing in the computer's memory in a plain text readable format.

    One problem with two factor authentication (2FA) is sim swapping. Sim swapping is accomplished through social hacking. A hacker will enter a store pretending to be you, and then they convince a worker to port your SIM card information to a new phone, one that they obviously own. Phishing attacks can also be used to bypass 2FA through the use of fake login pages. Further, hackers have developed means to bypass the following types of 2FA: hard tokens, call forwarding, knowledge-based questions, text message interception, and push to accept.

    Now, I am not saying to not use a Password Manager nor a 2FA, but I'm telling you to be aware of the risks and vulnerabilities, and research ways to protect yourself against the flaws in these systems.

  22. accent in the first one was fake lmao also they litterally just logged in and there is waaaay more than 3 thousand leaks

Leave a Reply

Your email address will not be published. Required fields are marked *