More stories

  • in

    The best outdoor security camera

    An outdoor security camera system is an excellent investment if you want to have peace of mind while you are far from home or simply go to sleep without worrying about troublemakers. Not only does it provide a level of protection, but it even adds value to your property.Finding the best outdoor security cameras requires thoughtful research evaluating criteria such as pricing, resolution and high tech features. We evaluated popular self-monitored outdoor cameras that do not require a professional security system to protect your belongings.If you prefer consumer-level smart home technology for your home surveillance system, here is our selection of the best outdoor security cameras in the market.CameraPriveResolutionStorageSmart Device CompatibilityAudioBlink Outdoor$99.99Up to 1080p$3/camera/mo. for cloud or USB-based free storageAlexa, Echo, Echo Dot2-wayArlo Pro 3$499 (two cameras)Up to 2KA 3-month trial then $2.99/camera/mo. cloud storageGoogle Home Hub, Alexa, Apple Home Kit, SmartThings2-wayWansview W6$37.99Up to 1080p280GB Micro SD or cloudAlexa2-wayWyze Cam Outdoor$49.99Up to 1080p14-day free footage historyGoogle Assistant, Alexa2-wayCanary Flex$281.39Up to 1080p1-day free footage history, 30 days with the subscriptionGoogle Assistant, Alexa2-way (with subscription)*Information accurate as of March 2021.

    Best overall outdoor camera

    Amazon

    Starting price: $99.99 | Resolution: 1080p | Field of view: 110 degrees | Features:Blink Home app2-year battery lifeFree cloud storage30 frames per second-4° to 113° Fahrenheit operating rangeDIY installationOur best overall outdoor security camera system has motion detection, free storage; it’s weather-resistant, works as an outdoor and indoor camera, and is enabled for two-way communication. The only catch is that you will need to buy the mount base separately for outdoor installation.Pros:No subscription service neededFree storageWeather-resistantAlexa voice compatibilityCons:No facial recognition or person detectionNot compatible with Google, Apple or MicrosoftCan’t expand storagePricing:1 camera: $99.99 2 cameras: $179.993 cameras: $249.995 cameras: $379.99Add-on camera: $89.99

    Best high-end outdoor camera

    Amazon

    Starting price: $499.99 | Resolution: 2K | Field of view: 160 degrees | Features:Two-way audioColor night visionWeather-resistantMagnetic mounts-20° to 45° Celsius operating rangeArlo Pro 3 is our best high-end option for outdoor security cameras. It offers a starting package for $499.99, which can easily read as expensive but comes with two cameras, so if you are willing to pay more, this is a great option.Pros:Indoor/outdoor useHigh video quality12x digital zoomCons:More expensive than competitorsPremiums features require a subscriptionStorage requires subscriptionPricing:2 cameras: $499.99 4 cameras: $799.99Add-on camera: $199.99$2.99 – $19.99/month storage subscription$9.99 – $19.99 continuous video recording per month

    Best outdoor security camera on budget

    Amazon

    Starting price: $37.99 | Resolution: 1080p |  Field of view: 105 degrees |The price of this camera starts at only $33.99, making it the most affordable camera on our top list. The Wansview W6 is a low-price yet a high-quality option for those on a budget.Features:Two-way audioColor night visionIP-66 water-resistant ratingCompatible with AlexaSubscription-based cloud storagePros: Cheapest optionEasy to install and set upClear vision day and nightCons:Poor reviews for mobile appRequires you to subscribe to a monthly serviceNot battery operatedPricing:1 camera: $33.994 cameras: $129.99

    Best for DIY installation

    Wyze

    Starting price: $49.99 |  Resolution: 1080p |  Field of view: 110 degrees | The Wyze Cam Outdoor cameras are easy to set up and start at a price lower than other competitors. Customers simply set up the base station, connect to the app and use magnetic mounts to install their cameras.Features:Two-way audio25-foot night vision distanceIP-65 water-resistant ratingInternal microSD storage is availableAlexa and Google Assistant compatibility14 days of free storage-4° to 120° Fahrenheit operating rangePros:Two weeks of free storageLocal storage availableEasy installationLess expensive than competitorsCons:The app is not user-friendlyShort-range night visionPricing:Starter bundle (1 camera and base station): $49.99Add-on cameras: $39.99

    Best for home integration

    Canary

    Starting price: $281.39 |  Resolution: 1080p |  Field of view: 116 degrees | The Canary Flex is compatible with Google Assistant and Alexa, making it easy to ensure your camera is always up and running. So if you leave for the weekend and forget to arm the security system, you can ask Google or Alexa to activate the camera while you’re away.Features:1 or 30 days of video storageTwo-way audio (subscription feature)Works wire-free or plugged in Motion detection-20° to 45° Celsius operating rangePros:HD night visionEasy installationWeather-resistantCons:Premium subscription required for best featuresNo local storage is availableMore expensive than competitorsPricing:1 camera and basic service: $281.391 camera and 1-year subscription: $393.101 camera and 2-year subscription: $504.81

    Outdoor security cameras: What you need to knowWhen looking for an outdoor security camera system, check for convenient features with advanced technology before choosing the one that suits your needs best. Features such as night vision, ample field of view, motion detection and real-time notifications to your phone, high-quality image and weather-resistance are essential for this type of camera. Checklist for choosing an outdoor security cameraHere is a list of elements that you need to cross out before buying your next outdoor security camera system:Night vision: Night vision allows you to see what’s happening even with low light. This technology usually works using infrared led lights, allowing cameras to capture good-quality video even at night.Motion detection: Motion detection technology finds real threats and alerts you to have a glimpse of what is happening and decide if you need to take action. The ideal features should include people and animal detection, so you don’t receive false alarms every time the neighbor’s cat hangs out at your porch. If you are buying an outdoor security camera on a budget, at least make sure you get a camera with motion detection technology. Ease of installation: A camera with an easy installation process is better when you are not too handy and don’t want to spend extra money on getting professional help. It is better to check what other customers write about the installation process; this way, you won’t waste time or money. Cost: When you buy home surveillance systems, you should consider more than just the camera price. You might need to consider additional expenses like accessories, cloud storage monthly fees, mount bases, and even professional installation, if necessary.  Audio: Many cameras have settings such as two-way audio to talk with visitors or even whoever delivers your packages. Be aware that although some cameras allow you to record audio, it may violate federal wiretapping laws unless proper signage is posted — depending on your state.Field of view: The field of view refers to how much area the camera can cover from a single angle: the narrower the field, the better view angle and focal distance you will have. For outdoor cameras, we prefer a field of view without at least 110 degrees or higher.   Resolution: The higher the resolution of the outdoor camera, the more internet bandwidth and space on the cloud or internal storage it will require.  A higher resolution will allow you to see much more details in the video, but you should consider if your internet service supports it and if you are willing to pay for a more expensive cloud storage service. We recommend going after a camera that offers at least 1080p in resolution.  Power source: If the outdoor camera you choose is wired, installing it could present challenges that may require professional help to handle it. Battery-powered systems are usually easier to install and charge, but you will need to make sure to check the charge level periodically, so it doesn’t stop working. Some cameras come with an app that allows you to monitor the battery for easier maintenance.     Outdoor camera accessoriesHere are some accessories that your outdoor cameras will need to work in optimal conditions:Camera base or mount: When you buy an outdoor camera, you must check if the package includes the camera base or mount — a must-have place to keep your camera on the best angle to capture your home surroundings.Solar panel charger: A solar panel charger will keep your camera’s battery charged without needing to worry about running out of battery. If you are forgetful or want to make an eco-friendly decision, make sure you get one.Subscriptions to cloud storage: Cloud storage exists to keep your security videos and clips digitally safe. Some camera manufacturers offer limited to no cloud storage for free, so you will probably need a subscription to store and access your video feed remotely and use premium features. Storage card: If you choose a camera that allows you to add an internal storage card, remember to get the compatible card that supports it. Usually, when you get a reading card for your home surveillance system, you won’t need to worry about extra cloud storage, although some features might still require you to get a subscription. Camera cover: If the camera you choose is not waterproof or water-resistant, you will need to get a camera cover. Another plus, if you get one, is that it will protect the equipment from hard weather conditions like sunlight and rain, giving it a longer life.Strong internet connection: We added a stable internet connection as an accessory since, if your camera equipment is going to be installed outside, you will need it to enjoy most of your camera’s features. Without a stable internet connection, you will have delays on your two-way conversation and lags on your live streamings and motion detection notifications.Outdoor security camera FAQ

    Are outdoor security cameras worth it?

    Outdoor home security cameras serve as an extra layer of protection for your home. Whether you are at your property or not, a camera allows you to monitor your home’s surroundings from your smartphone or computer. If any unusual activity occurs, a home surveillance camera helps gather evidence, and even the sight of them can keep burglars away. Having this peace of mind makes outdoor cameras worth it.

    What do I need to know before buying an outdoor security camera?

    As with most things that we buy for our home, it is essential to know what you need and expect from this camera, as there are plenty of options available. For example, the weather conditions in your area can be a determining factor to choose an outdoor security camera. Other criteria to keep in mind include price, compatibility with your smart home system, camera range, motion detection technology, night vision and remote access

    Where should I install outdoor security cameras?

    According to the Bureau of Justice Statistics, the ideal areas to install outdoor security cameras are first-floor windows, front, back and side doors. Other crucial areas to have cameras are the garage or driveway.

    Which one is best, outdoor or indoor security cameras?

    If you are trying to keep burglars away, it’s better to have an outdoor camera. But bear in mind that indoor and outdoor security cameras are pretty different. Outdoor cameras alert you when a new package arrives, allow you to know who’s near or entering your house, and notify you if there are any sudden and unexpected moves in the surroundings. Indoor cameras are useful for monitoring what’s inside your house, checking the kids in other rooms, and even having conversations with them while you are away from home. Try to identify what your needs are and choose wisely, depending on that.

    What should I look out for when buying an outdoor security camera?

    If you are looking for a camera that does a great job, look for value, storage location (local or cloud), and how easy the installation process is. You should also consider the power source, if it has smart home functionalities, and what the monitoring options are. For example, if it has access to an app and also has web-based access. Every camera offers different things; make sure that you are receiving what you need when making a decision. More

  • in

    Safe connectivity tips for domestic violence victims

    According to “Tech Abuse: Information From the Field,” a 2018 survey by the National Network to End Domestic Violence (NNEDV), “technology misuse is often intertwined with other forms of abuse survivors are facing in their daily life.” Only 11% of domestic violence advocates surveyed had not encountered cases involving tech misuse over the past year. 51% of the respondents had worked with 1 to 15 cases of technology misuse, and 12% had seen more than 50 cases in that same year. The type of technology misuse reported ranged from spying with hidden cameras to intimidation and threats via technology to recording devices placed inside a personal item.  That same survey showed that only 13% of domestic violence advocates feel totally confident that they have the skills to help victims and survivors with their concerns and challenges involving technology.If you are in immediate danger, please call 911. Still, if you are experiencing domestic violence and seeking help, resources or information, confidential trained advocates are available 24/7/365 at no cost through the National Domestic Violence Hotline.The list of potential abuses you need to manage as a victim is already lengthy and overwhelming, from financial to emotional to physical. But as statistics show steady year-over-year growth in the number of connected homes, with no end to this trend insight, ensuring you understand how technology can be used — both against you and to your benefit — is important.
    reviews.com
    Identify and understand the technology around youIf you’re living with your abuser or still in a relationship with them in some way, the first step is to take an inventory of what smart technology devices are in your home. Abusers can use the internet, home network, Wi-Fi, Bluetooth-connected speakers, cameras, locks, doorbells, and more to harass, stalk, harm, and otherwise attempt to control your movements and activities. In invasive ways, they can also use smart toys and items designed to increase children’s safety, such as baby monitors. NNEDV notes that some toys “come equipped with cameras, microphones, and speakers so the toys can interact with the child.” Still, most of these toys are not built with strong security protections and may give “unauthorized video or audio access … [that] could be used to stalk, control or harass a survivor.”  Make a list of all the devices you can find in your home and identify who installed them and who has access to the device’s account or app. Some tech is easily visible; other tech, such as motion sensors tucked on bookshelves or in-room corners, may be less obvious. If you are unsure what devices are currently active in your home or are concerned some might be hidden, NNEDV has put together a detailed list of gadgets to look for, along with potential tactics abusers may attempt.

    A few common household devices the NNEDV includes on its list:ThermostatSmoke detectorsVideo doorbellsEntertainment systemsSmart lightbulbsAppliancesNNEDV also suggests understanding the Wi-Fi you use and checking that Wi-Fi network history to see what devices are or have been connected. However, it also suggests you don’t simply delete the whole history because that may give your abuser a heads up that you’re looking into these issues.Don’t simply delete your whole browsing history because that may give your abuser a heads up that you’re looking into these issues.National Network to End Domestic Violence (NNEDV)Once you’ve identified what’s being used in your home, educate yourself about how the devices work, how they’re being used and what information they might be tracking. And if you use technology like Google Home, Alexa, and Siri, there are ways you can opt-out of the tracking features that come with them. Also, figure out how to spot changes in the tech — whether it’s a device that begins working differently or a new device that appears in your home.And recognize that what’s happening around you in your home may be happening specifically because your abuser controls this kind of tech. Graciela Rodriguez, who runs an emergency shelter at the Center for Domestic Peace in San Rafael, California, spoke with The New York Times about what she’s been hearing more recently from those accessing the shelter’s services. She told the New York Times that “some people had recently come in with tales of ‘the crazy-making things’ like thermostats suddenly kicking up to 100 degrees or smart speakers turning on blasting music. They feel like they’re losing control of their home. After they spend a few days here, they realize they were being abused.””Technology, in its various forms, offers essential tools victims can use to access help, strategically maintain safety and privacy, and remain connected to family and friends. It can also be used to prove guilt and hold offenders accountable.”NNEDV’s Safety Net ProjectUse tech to your benefitWhile it may feel like smart tech is more of a negative than a positive, “technology, in its various forms,” states the NNEDV’s Safety Net Project, “offers essential tools victims can use to access help, strategically maintain safety and privacy, and remain connected to family and friends. It can also be used to prove guilt and hold offenders accountable.”Keeping a technology abuse log is one suggestion NNEDV makes to all victims because, as the organization says, this type of detailed documentation can:Give you a record of what is happening, which may be helpful if you want to pursue legal actions.Alert you to any escalation in monitoring and control, which may indicate the danger is increasing as well.Help you see patterns of technology abuse and may help determine how the abuser is misusing a particular technology. While The New York Times reports that lawyers are “wrangling with how to add language to restraining orders to cover smart home technology,” it also reports that “advocates are beginning to educate emergency responders that when people get restraining orders, they need to ask the judge to include all smart home device accounts known and unknown to victims.”While The New York Times reports lawyers are “wrangling with how to add language to restraining orders to cover smart home technology,” it also reports that “advocates are beginning to educate emergency responders that when people get restraining orders, they need to ask the judge to include all smart home device accounts known and unknown to victims.”If you suspect your abuser may have bugged your phone or installed tracking software, restore the device to factory settings and create a new strong password.Secure your homeWhen you’ve ended an abusive relationship, it may feel tempting just to unplug and toss everything. But typically, there are ways to save and reuse the tech to your benefit. For instance, don’t dump your mobile phone because this may cause you to become isolated from those family and friends who can offer support, as well as cut you off from emergency services. Do, however, separate any combined phone plans you have with your abuser, especially if you’re going to add mobile-app-based security. And if you suspect your abuser may have bugged your phone or installed tracking software, restore the device to factory settings and create a new strong password.
    reviews.com
    If you’re still living in the home but the abuser has left, you’ll want to take steps to secure your space. The abuser may still be connected remotely and still using smart devices to intimidate or control you. In this case, other actions to consider taking include:Changing your passwords (and consider using a password manager to generate strong passwords in case your abuser has at one time had access to your passwords)Changing router or network settingsDisabling the devices by using reset buttonsContacting the device manufacturers and asking them to change account ownership and accessUsing two-factor authentication when resetting device appsIncorporate smart technology into your home and lifeIf you’re out of the abusive situation and in control of your own home, individual connected devices can be a wise choice for security. Video doorbells with high-resolution cameras and wide fields of vision let you easily see who’s at or near your door, offering extra security when both expected and unexpected individuals arrive at your home.Smart locks can be connected to smart lights, so you can illuminate your home before you step inside. Some smart locks come with built-in alarms that go off when there is a forced entry. If you’re concerned you forgot to lock your door before leaving, apps allow you to check-in and secure your home remotely.Full home security systems with intrusion sensors, surveillance videos and safety monitoring capabilities are also an option, as are DIY security systems. Both can offer advanced home automation features, and voice assistant compatibility is becoming more and more standard.All of the above can help offer some peace of mind, whether your abuser is completely out of the picture or still in contact in some way.   Know you’re not aloneAccording to the U.S. Department of Justice’s Bureau of Justice Statistics, intimate partner contact sexual violence, and/or intimate partner stalking, and intimate partner violence accounts for 15% of all violent victimizations.If you are one of those individuals, one additional tech-related safety resource you might want to access is NNEDV’s Tech Safety app, available in English and Spanish, which helps “identify technology-facilitated harassment, stalking or abuse” and offers tips on what to do in six categories: harassment, impersonation, cellphone safety, device safety, location safety and online safety. Within each category, the app shares “specific explanations on what someone can do if they are being harassed, as well as privacy tips that can be used to increase privacy and security.” While NNEDV clearly states the information the app shares is not meant to be a comprehensive safety plan, it does provide resources on where to call for help and how to document abuse, work with a domestic violence advocate, contact the police, and find an attorney.Whether you are currently in a violent relationship or a domestic violence survivor, you may feel alone, but you are not. And there are many ways to once again feel safe and secure in your own home. If you are in dangerIf you are in immediate danger, please call 911. Still, if you are experiencing domestic violence and seeking help, resources or information, confidential trained advocates are available 24/7/365 at no cost through the National Domestic Violence Hotline. Call them at 1-800-799-7233 (1-800-787-3224 for TTY) or, if you are certain that your computer or mobile phone is not being monitored by your abuser or a third-party, chat with an advocate through the NDVH website.  More

  • in

    You can use your home security system to prevent teens from sneaking out, but should you?

    Teens are known to roam, but new threats in the digital age can make sneaking out feel riskier than ever to parents. One option is to fight fire with fire: Counter threats born of technology (like meeting up with online connections) with technological solutions. You can put smart home security devices to work monitoring your teen. The same capabilities that keep those who don’t belong out — motion detection, door and window sensing, video streaming — can keep tabs on those who belong in. You just need to be able to arm and disarm the system and field notifications by smartphone.   Self-monitored home security can stand guardTraditional home security is professionally monitored. When the alarm is tripped, the notification is fielded by agents at a command center. They contact you, then emergency responders. If you have a professionally monitored system, think twice before arming it against your kids. The costs of a false alarm can be steep, depending on your municipal code. Self-monitored systems push alerts to your smartphone. It’s up to you to respond to or ignore system alerts. You’ll need to have a self-monitored home security setup in order to track your teen without accidentally looping in the police. Window/Door Sensors: Make sure doors and windows are locked through the night by installing contact sensors. Stick them anywhere that should stay shut, like the home office or the liquor cabinet. Motion Sensors: A motion sensor covers more terrain than a window/door sensor and also provides a longer leash. For example, you might not care where your kids are in the house, so long as they aren’t heading out into the foyer or garage. Off-limit rooms and points of egress can receive blanket surveillance with a single motion sensor.  Video Doorbell: A surveillance camera pointed at your teen isn’t likely to promote a trusting relationship. But a video doorbell is so much friendlier than a plain camera. It’s both a security device and a smart home tool. It captures footage of porch pirates and trespassers but also lets you tell the mail carrier where to stash deliveries. It’s no stretch to use one for notifications when your kids get home from school or to see which friends are visiting while you’re gone. Let teens know how you monitor themSensors and systems are easily disabled by any family member who knows how they function — a practical reason to inform your teen of any plans to track their comings and goings. If they don’t want to be surveilled, a tech-savvy teen will shrug off surveillance attempts. Frame your use of home security tech to keep an eye on them as a way to endorse their liberty, not take it away. For example, if you get a push notification when they get in at night, they are freed up from the responsibility of letting you know themselves. Involve your kids in your security plansCome to an agreement with your teen about when you turn to surveillance. Talk about what aspects of their daily, autonomous life cause you stress — be it their online behavior, their driving, or staying out late. If it’s their internet life that you’re worried about, negotiate browser controls. Comcast, for one, allows you to limit Wi-Fi access at the device level. Maybe getting to check your GPS when they arrive at their friend’s house would give you peace of mind and circumvents the need for them to update you. If it’s the out-at-all-hours behavior that has you on edge, let them know that you want to put a motion sensor in the hall, so you know when they get home safe. You could even set a specific keypad code for them to disarm your security system when they get home, giving some power back. When used thoughtfully, surveillance tech can streamline family communications. Extend the conversation to other parents and teensIf your parenting practices clash with those of your teen’s friends, you are more likely to have problems trying to enforce house rules. Your best bet is to collaborate with other parents. Establish shared norms around curfews and internet use so that any extra security you try to build around your teen isn’t wildly different from the unlimited freedom of their peers. 

    Creating a shared community around safety doesn’t stop there. Teens are often just looking for someplace to go. Band together with other parents to provide spaces (mother-in-law cottages or dens) that have nearby adults and parental supervision but give the impression of being hands-off hang-outs. Surveillance can backfireMost parents and teens acknowledge that technology has radically altered adolescent life. But they are divided on whether that makes it right for parents to counter tech-age threats with tech-age tools. If technology has brought about a more dangerous reality for teens, are technological controls warranted? Psychologist Lisa Damour cautions of the damage surveillance can do to the parent-child relationship. In fact, “[A]dolescents who believe their parents have invaded their privacy go on to have higher levels of conflict at home.” A disgruntled teen will find ways of evading digital babysitting. Worse, they could grow sneakier and more secretive in rebuke. Veteran social worker Janet Lehman advises against holding the conversation in the heat of the moment. Give yourself time to calm down and prepare for a “problem-solving conversation,” Lehman writes. She suggests that bad behavior in kids — lying, stealing, sneaking out — is the result of having a “really poor way of solving problems… If you look at lying as a problem-solving issue, and not a moral one, you can help your child develop strategies.”According to media psychologist Pamela B. Rutledge, “Parental controls should be viewed as training wheels until a kid gets his or her balance, not a solution.” Your teen won’t learn responsibility for either their digital practices or physical wellbeing by being policed. Instead, “the only solution is education.” Many teens support parental controlsWhether and how you use technology to surveil your teen is up to you. The question is complex, bringing in big parenting questions on safety, trust, and privacy. If you believe that monitoring your teen will help keep them safe and you sane, be selective and rational about your chosen approaches. And inform your kid of any and all monitoring actions you take. According to one study, a majority of teens actually support the use of parental controls, showing that most young people get parents’ concerns. Whatever you decide, you should open up a conversation with your teen about safety and responsibility. More

  • in

    Vivint home security review

    Whether you’re looking for a traditional home security system or want a full automation system, Vivint has excellent plans that make it a great fit if you’re looking to simplify your life. It’s not the cheapest, but additional features like expert installation and automation make it well worth it for many customers.Pros:Expert security monitoringAdvanced home automationMonthly contracts optionsCons:More expensive than other optionsHave to pay for equipment upfrontVivint packagesPackagesPrice*Best forEase of  UseType of InstallationSmart Security Monitoring$29.99Outdoor camerasEasyProfessionalSmart Home Monitoring$39.99Home automationIntermediateProfessionalSmart Home Video Monitoring$44.99Video surveillanceAdvancedProfessionalAll information accurate as of 06/11/2020.*Plus equipment financing if paying for equipment over contract termVivint offers three basic packages that offer all of the services you need. Vivint specializes in superior equipment with full home automation — something not all home security companies offer. There is also live 24/7 support to ensure there is someone to help if you need it.

    We really liked Vivint Car Guard, a helpful addition to your security when there’s a teenager or a senior driver in the home. Available separately or with your plan, Vivint Car Guard will notify you of fender benders, accidents, tows and theft with smart notifications and geo-fencing to keep the vehicle close.Who is each Vivint package best for?Vivint’s packages are highly customizable, but here are our recommendations for some of their most popular options.Smart Security Monitoring: Best for StartersSmart Home Monitoring: Best for Home AutomationSmart Home Video Monitoring: Best All-Inclusive SecuritySmart Security MonitoringWhen you need basic security monitoring without the fuss of video and home automation, smart security monitoring lets you take control of home security yourself.Smart Home MonitoringProtect your family with professional monitoring that includes extra features like window and door sensors, smoke and carbon monoxide detectors and a smart app that keeps you plugged in even when you are not at home. Smart Home Video Monitoring It’s tough to beat Vivint’s technology with indoor and outdoor cameras that identify lurkers and built-in body detectors. Vivint equipment:Basic Home EquipmentDoor sensorsMotion sensorsGlass break sensorsSmoke detectorsCarbon monoxide (CO) sensorsWater sensorsCamerasPing Indoor CameraOutdoor Camera ProDoorbell CameraVivint pricesVivint’s pricing is mid-range among its competitors. Contracts can run up to five years long, but you also have the option of a month-to-month account. However, you will have to purchase your equipment upfront that can call for an expensive initial investment. There is a 120-day warranty for purchased equipment and unlimited repair on any equipment covered under a service plan.Ease of useRegardless of your plan, you can still enjoy access to its apps. This allows you to control your home from anywhere in the world. No matter where you are, you can log into the Vivint app to unlock the door for family or turn off the light you missed on your way out. You won’t be able to receive any of these benefits until you complete the in-person installation process with an actual rep. Vivint types of installationProfessional installationVivint values customer service, and that is no more apparent than its installation process. You will benefit from a personal technician who will come out to your home to create and install your perfect security system personally.ProsYou can benefit from the expertise of a professional who can customize the right package of you. You can add on equipment during your installation appointment.You receive high-end equipment that is installed for you without the time and trouble of doing it yourself.ConsVivint does not include its equipment in its packages; instead, you must purchase it separately. Installation can be an expensive process. DIY installationVivint does not offer DIY or self-installation.Vivint types of monitoringSelf-monitoredSmart Security ServiceInteractiveCostEquipment purchase required$29.99/month$39.99/monthMonitoringDIYProfessionalProfessionalInstallationProfessionalProfessionalProfessionalMobile App Control✗✓✓When it comes to monitoring, you have plenty of options. If you want to skip the monthly monitoring service, you can go the DIY route, but you will still need to purchase your equipment upfront to avoid the contract.If you opt for a monitoring plan, you can choose from two different plans, Smart Security Service and Smart Home Service. The Smart Security plan offers you basic monitoring with fire, theft and carbon monoxide detectors, window and door sensors and smoke alarms. If you want to add video surveillance, you can opt for the Smart Home Service, which is just a few dollars more a month.Additional benefitsApp access includedApp access is included with all plans, and you have the option to add Vivint Smart Drive to store all of your data so that you aren’t forced to part with any records or footage that you may need later. However, this is an additional purchase that will cost you.No shortage of featuresVivint doesn’t slack on technology. You can benefit from up to 1080p resolution on the indoor and outdoor cameras for an even better picture, and The Ping Indoor Camera even has calling capability.Extra securityThe cameras can provide you with a wide field of vision of up to 180 degrees. Vivint also incorporates new, improved technology like infrared night vision, 4K image sensors, body and lurker detectors and a siren.Additional drawbacksLong contractsIf you don’t purchase your equipment outright, you can finance it, but that will come with a minimum contract of five years. It is a long time to commit to a home security plan when your needs can easily change before then.Requires an investmentOther companies like Ring offer DIY installation and service as low as $3 a month,  and while they don’t have Vivint’s technology, they don’t require you to spend hundreds of dollars on equipment purchases.Compare home security providers* Our rating is based, in part, on industry metrics such as Better Business Bureau grades and rankings in the J.D. Power 2019 Home Security Satisfaction Study, as well as user ratings via the Google Play Store and Apple App Store.** Pricing is for the basic package. Please note pricing will vary based on customization, package tiers, and fees.The bottom lineVivint is among the very best in the industry. The free app offers a live feed and past footage, while smart home automation lets you turn off the lights and lock the doors from anywhere in the world.The customer service is stellar, with live representatives standing by to dispatch help when and where you need it, no matter the time. It’s an additional layer of security that makes a real difference in an emergency.

    Is Vivint better than ADT?

    Vivint offers more options at a lower price than ADT, and its no-contract option provides far greater flexibility than its competitor. 

    Is Vivint better than Ring?

    Ring is a more affordable option, offering the DIY packages that Vivint lacks, but you won’t be able to benefit from a professional installation with Ring as you do with Vivint.

    Do I need Wi-Fi for Vivint?

    Vivint works off a wireless connection, so you will need WiFi to use your new security system. This is more convenient for you because the installation will not require any risky wires that need to be cut or moved.

    Is Vivint easily hacked?

    Vivint uses a wireless connection, which is not as easily hacked as a wired connection. However, any wireless connection is vulnerable to a cyberattack, so using the latest software updates and security programs is always important.

    How long do Vivint batteries last?

    Vivint batteries last a long time before they need to be repowered. Some devices run on traditional batteries for over eight months, while others can be recharged in a matter of hours or even minutes.

    Does Vivint work if the power goes out?

    Most Vivint systems utilize a wireless connection, so your wireless connection usually holds strong even if you lose power at home. If you lose WiFi, Vivint includes a backup battery in each of its devices.

    Can you use Vivint without a subscitption?

    The advantage of Vivint’s equipment is that once you purchase it, it will work without a professional monitoring contract. However, you will be limited to certain features and will lose access to things like the mobile app and 24/7 support.  More

  • in

    REvil ransomware group resurfaces after brief hiatus

    The operators behind the REvil ransomware group have resurfaced after allegedly closing shop following the widespread attack on Kaseya that caused thousands of victims on July 4.Security researchers said all of the dark web sites for the prolific ransomware group — including the payment site, the group’s public site, the ‘helpdesk’ chat and their negotiation portal — went offline on July 13 after the Kaseya attack drew worldwide condemnation and tough threats from US lawmakers. 

    Kaseya attack

    US President Joe Biden spoke personally with Russian President Vladmir Putin after the attack, and many attributed REvil’s closure to the conversation, where Biden pressed Putin about ransomware attacks originating from Russian soil. Despite the conversation, both US authorities and Russian officials denied any involvement in REvil’s disappearance in July.But dozens of security researchers took to social media on Tuesday to show that the group’s Happy Blog and other sites connected to REvil had resurfaced. Bleeping Computer reported that the newest entry was from a victim who was attacked on July 8. Security researchers from Recorded Future and Emsisoft both confirmed that much of the group’s infrastructure was back online. Ransomware expert Allan Liska told ZDNet that most people expected REvil to return, but with a different name and a new ransomware variant. 

    “Things definitely got hot for them for a while, so they needed to let law enforcement cool down. The problem (for them) is, if this is really the same group, using the same infrastructure they didn’t really buy themselves any distance from law enforcement or researchers, which is going to put them right back in the crosshairs of literally every law enforcement group in the world (except Russia’s),” Liska explained.”I’ll also add that I’ve checked all of the usual code repositories, like VirusTotal and Malware Bazaar, and I have not seen any new samples posted yet. So, if they have launched any new ransomware attacks there haven’t been many of them.”A screenshot of REvil’s Happy Blog. 
    Brett Callow
    A report from security company BlackFog on ransomware attacks in August found that REvil accounted for more than 23% of the attacks they tracked last month. That was more than any other group tracked in the report. REvil attacked at least 360 US-based organizations this year, according to Emsisoft threat analyst Brett Callow. The RansomWhere research site says the group has brought in more than $11 million this year, with high profile attacks on Acer, JBS, Quanta Computer and more.  REvil’s shut down in July left some victims in a tough spot. Mike Hamilton, former CISO of Seattle and now CISO of ransomware remediation firm Critical Insight, said one company paid a ransom after the Kaseya attack and received the decryption keys from REvil but found that they didn’t work. REvil typically offered a help desk function that aids victims with getting back their data.”Some of our customers got off really easily. If you had that agent installed on unimportant computers, you just rebuilt them and got back to life. But we got a distress call a few days ago from a company that got hit hard because they had a company that was managing a lot of their servers with the Kaseya VSA. They got a lot of their servers hit and had a lot of information on them and so they brought in their insurance company and decided to pay the ransom,” Hamilton said. “They got their decryption key and when they started to use it, they found that in some places it worked and in other places it didn’t. These ransomware gangs have customer support but all of a sudden they went dark. They’re completely gone and so there is no help and these folks are just stuck. They’re going to end up losing a lot of data and they’re going to end up spending a lot of money to completely rebuild their network from scratch.” More

  • in

    Watch out for digital Hurricane Ida scams: SEC

    The SEC has released a notice warning people to be on the look out for scams related to Hurricane Ida, which thrashed multiple states last week with torrents of rain and tornados while leaving millions without power. The SEC said people who may be receiving lump sum payouts from insurance companies due to damage from Hurricane Ida should be wary of investment scams or other online efforts to steal their money. “These scams can take many forms, including promoters touting companies purportedly involved in cleanup and repair efforts, trading programs that falsely guarantee high returns, and classic Ponzi schemes where new investors’ money is used to pay money promised to earlier investors,” the SEC explained. “Some scams may be promoted through email and social media posts promising high returns for small, thinly-traded companies that supposedly will reap huge profits from recovery and cleanup efforts.” AccuWeather CEO Dr. Joel Myers estimated that Hurricane Ida caused nearly $95 billion in total damage and economic loss after dumping inches of rain on Louisiana and then continuing its path of destruction up the East Coast. Millions of people will now need to deal with insurance companies to cover water damage and other issues stemming from the after effects of the hurricane.

    Read this

    Video: IT heroes of Hurricane Sandy

    ZDNet interviewed a panel of IT heroes who kept their organizations running During Hurricane Sandy with successful disaster recovery plans. Watch the full 40-minute panel discussion as these IT leaders share the lessons they learned.

    Read More

    The SEC noted that after the devastation caused by Hurricane Katrina in 2005, there were dozens of “false and misleading statements about alleged business opportunities” that they were forced to take action against. “Be skeptical if you are approached by somebody touting an investment opportunity. Ask that person whether he or she is licensed and whether the investment they are promoting is registered with the SEC or with a state,” the SEC added. 

    “Take a close look at your entire financial situation before making any investment decision, especially if you are a recipient of a lump sum payment. Remember, your payment may have to last you and your family for a long time.”The financial watchdog warned of ponzi schemes and other scams that may be targeted at those receiving payouts from FEMA or insurance companies. Cyber Security Cloud released a study last month noting that there was a growing trend of increasing cyberattacks before, during and after any sort of global or regional event.The study found a massive increase in attacks aimed at Japanese organizations ahead of the Olympics this year and attacks aimed at US organizations ahead of the Super Bowl. Cerberus Sentinel vice president Chris Clements echoed the findings of the study, telling ZDNet that scammers frequently target newsworthy events to lure victims into taking urgent action, especially when related to financial means.  “We saw widespread campaigns targeting pandemic stimulus checks and I expect we will continue to see similar targeted operations both with this instance and with any future events. Individuals and organizations both must stay on guard for any unsolicited inbound communications promising financial windfalls and requiring urgent action,” Clements said.  “Especially important is to identify ‘trusted paths’ for any legitimate relief funds or investment opportunities and to properly research their validity.”James McQuiggan, security awareness advocate at KnowBe4, told ZDNet that in stressful times, those affected by floods, hurricanes and fires need help quickly and rely on their emotions without taking the extra time to examine an email to determine its validity. “Users want to avoid clicking on links in solicitation-style emails asking people to donate or be leery of requests to download images or video clips of people in troubled times. Cybercriminals will always find emotional lures to exploit users through social engineering,” McQuiggan said. “People want to recognize and only donate to worthwhile and established organizations that support people in life’s unfortunate situations after a hurricane or medical emergency. Additionally, this is critical for users who want to help out those in need and those who require financial assistance.” More

  • in

    Howard University announces ransomware attack, shuts down classes on Tuesday

    Howard University announced on Monday that it has been hit with a ransomware attack, forcing the school to shut down classes on Tuesday, according to a statement from the prominent HBCU.The school said that on September 3, members of their technology team noticed “unusual activity” on the university’s network and shut it down in order to investigate the problem. They later confirmed it was a ransomware attack but did not say which group was behind the attack. 

    ZDNet Recommends

    The best cyber insurance

    The cyber insurance industry is likely to go mainstream and is a simple cost of doing business. Here are a few options to consider.

    Read More

    “The situation is still being investigated, but we are writing to provide an interim update and to share as much information as we safely and possibly can at this point in time, considering that our emails are often shared within a public domain,” Howard University said in a statement.”ETS and its partners have been working diligently to fully address this incident and restore operations as quickly as possible; but please consider that remediation, after an incident of this kind, is a long haul — not an overnight solution.”The school has contacted law enforcement and is working with forensic experts on the issue. They claim there is “no evidence of personal information being accessed or exfiltrated” but noted that the investigation is ongoing. The school was forced to cancel all classes on Tuesday in order to address the issue and the campus is only open to essential employees. Even the campus Wi-Fi is down. They noted that some cloud applications will remain accessible to students and that they will continue to update students and faculty at 2pm each day. “This is a moment in time for our campus when IT security will be at its tightest. We recognize that there has to be a balance between access and security; but at this point in time, the University’s response will be from a position of heightened security,” the school added. 

    “This is a highly dynamic situation, and it is our priority to protect all sensitive personal, research and clinical data. We are in contact with the FBI and the D.C. city government, and we are installing additional safety measures to further protect the University’s and your personal data from any criminal ciphering. You will receive additional communications from ETS over the course of the next few hours and continuing into the next few days, especially surrounding phishing attempts and how to protect your data online beyond the Howard University community.” Howard University becomes yet another major educational institution to face a ransomware attack. Emsisoft researchers found that there was a 388% increase in successful ransomware attacks on the education sector between the second and third quarters of 2020.Comparitech researchers Rebecca Moody and George Moody found that there have been a total of at least 222 ransomware attacks affecting 3,880 schools and colleges since 2018.”Schools and colleges have suffered an estimated 1,387 days of downtime due to ransomware attacks with around 9,525 days spent on recovery efforts. 22 schools/colleges revealed the amount involved in their recovery efforts with nearly $19.2 million spent by these entities in total,” the researchers explained. “This is an average of nearly $960,000. Ransom requests varied from $5,000 to $40 million. Hackers have received at least $2.95 million in ransom payments with the average payment being $268,000. Hackers have requested at least $59.1 million in ransom payments with the average request being $2.47 million.”According to the report, there have already been at least 39 reported ransomware attacks on educational institutions this year, and these figures do not include the Kaseya attack, which affected a number of universities tangentially.Emsisoft threat analyst Brett Callow put the number even higher for 2021 at 62 US educational institutions that have been hit with ransomware. Cerberus Sentinel vice president Chris Clements said educational institutions and especially universities are popular targets for ransomware gangs because they are typically soft targets for cybercriminals to penetrate and have sprawling, disparate technology projects that can remain unpatched or orphaned with no centralized oversight by IT.  “Overly permissive access and permissions is another common issue in high education organizations that can easily be exploited by attackers if they gain access to a single user account. Secondly, ransomware gangs know that universities, despite being famous for budget issues, can produce huge amounts of money to pay ransoms when forced to,” Clements said. “This combination of relative ease of compromise and high ability to pay out extortion demands make universities incredibly lucrative targets for cybercriminals.”Tim Erlin, vice president of strategy at Tripwire, told ZDNet that universities are tough environments to secure. “Their populations vary greatly over the course of a year. They accept all kinds of devices into their networks, both from staff and students. And they change out their users at a high rate as students graduate and matriculate,” Erlin explained. “Not many other IT organizations have to deal with all of these factors.” More

  • in

    Jenkins project attacked through Atlassian Confluence vulnerability

    Jenkins, a leading open source automation server, announced on Saturday that its deprecated Confluence service was successfully attacked through the Confluence CVE-2021-26084 exploit — something that US Cybercom warned of in a notice last week. See also: US Cybercom says mass exploitation of Atlassian Confluence vulnerability ‘ongoing and expected to accelerate’

    In a statement, Jenkins documentation officer Mark Waite explained that the affected server was taken offline and the team is investigating the impact of the issue.”At this time we have no reason to believe that any Jenkins releases, plugins, or source code have been affected. Thus far in our investigation, we have learned that the Confluence CVE-2021-26084 exploit was used to install what we believe was a Monero miner in the container running the service,” Waite wrote. “From there an attacker would not be able to access much of our other infrastructure. Confluence did integrate with our integrated identity system which also powers Jira, Artifactory, and numerous other services.”Waite added that there is no indication that any developer credentials were taken during the attack but that they “cannot assert otherwise and are therefore assuming the worst.”Jenkins said that until it re-establishes a “chain of trust with our developer community,” it will be preventing releases. Every account password has been reset and the Jenkins infrastructure team has permanently disabled the Confluence service. The team has also rotated privileged credentials and taken measures to reduce the scope of access across their infrastructure. 

    “We are working closely with our colleagues at the Linux Foundation and the Continuous Delivery Foundation to ensure that infrastructure which is not directly managed by the Jenkins project is also scrutinized,” Waite noted. “In October 2019 we made the Confluence server read-only effectively deprecating it for day-to-day use within the project. At that time, we began migrating documentation and changelogs from the wiki to GitHub repositories. That migration has been ongoing, with hundreds of plugins and many other documentation pages moved from the wiki to GitHub repositories.”The notice comes after multiple IT leaders took to social media to confirm that CVE-2021-26084 was indeed being exploited.Atlassian updated its notice — released on August 25 — to confirm that the vulnerability is being actively exploited in the wild. “Affected servers should be patched immediately. The vulnerability is exploitable by unauthenticated users regardless of configuration,” Atlassian added to their previous notice. US Cybercom caused a stir when it tweeted on Friday, “Mass exploitation of Atlassian Confluence CVE-2021-26084 is ongoing and expected to accelerate. Please patch immediately if you haven’t already — this cannot wait until after the weekend.”BleepingComputer confirmed on Thursday that some threat actors are installing cryptominers on both Windows and Linux Confluence servers using the vulnerability.  Shawn Smith, director of infrastructure at nVisium, told ZDNet that the Atlassian Confluence vulnerability is “definitely still being exploited.” “If we look at the list of versions that are vulnerable, it includes nearly every version — all the way back to the 4.x.x line, which was originally released in 2011. Looking at the early details, we know that nearly 15,000 servers were present online before the vulnerability disclosure — and eight days later that number had dropped by less than 4,000,” Smith said. “Now, we’re only an additional five days beyond that and it’s unlikely that a significant number of servers were patched, especially considering it was a holiday weekend in the United States.”
    Censys
    Cybersecurity company Censys updated their own blog post on Sunday to say that the number of vulnerable Confluence instances dropped from 11,689 to 8,597 since last Thursday. Bad Packets reported that CVE-2021-26084 exploit activity was being detected from hosts based in Russia targeting their Atlassian Confluence honeypots. They previously said they “detected mass scanning and exploited activity from hosts in Brazil, China, Hong Kong, Nepal, Romania, Russia and the US targeting Atlassian Confluence servers vulnerable to remote code execution.” More