And that's the most likely way that the 'hacker' got in, he downloaded one of the many lists of emails/passwords off the internet (Oooh, the DARKWEB, also on a whole lot of regular internet sites) and entered the e-mail and password into Ring's website and was able to look through the cameras and use the push to talk button.
It also COULD be someone they know; if so, their local police department should be able to get the information from Ring as to IP address and go arrest the guy. (This is actually the best case scenario as odds are they wouldn't be using anything to mask their location.)
So most likely issue is lax password security.
> “So most likely issue is lax password security.”
I agree and all of us are guilty of that to some extent.
I shudder to think the Dark Web might have some of my recent passwords. Now I have to schedule a time to change them all.
Password management seems a ripe App field money-making opportunity.
if she installed a camera app (or any other IoT device, for that matter) and didn’t change the default password, that’s foolish. if she installed a camera app without MFA, that’s moderately foolish.
it doesn’t mean that they were targeted by someone in desoto county, MS, four days after they installed the thing.