Technology
Smart home hacking fears: What’s real and what’s hype
NEWYou can now listen to Fox News articles!
News of more than 120,000 Korean home cameras being hacked recently can shake your confidence in connected devices. Stories like that make you picture cybercriminals breaking into homes with high-tech gadgets and spying on families through smart cams. That reaction is natural. But most of these headlines leave out important context that can help you breathe a little easier.
First, smart home hacking is rare. Most incidents stem from weak passwords or from someone you already know, rather than from a stranger with advanced tools. Today’s smart home brands push out updates to block intrusion attempts, including patches for new AI-related vulnerabilities that often make headlines.
Let’s break down what actually puts a smart home at risk and what you can do to stay safe.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter
SMART HOME DEVICE MAKER EXPOSES 2.7 BILLION RECORDS IN HUGE DATA BREACH
Smart home hacking headlines can look scary, but most threats come from weak passwords rather than targeted attacks. (Kurt “CyberGuy” Knutsson)
Why criminals are not circling your house with hacking gear
Many people imagine cybercriminals driving around neighborhoods with scanners that look for vulnerable devices. In reality, Wi-Fi ranges and technical limits make that nearly impossible. Even high-profile hacks of casinos and large companies do not translate to criminals trying to breach residential smart locks for petty theft.
Burglars still choose low-tech methods. They look for unlocked doors or easy entry points. They avoid complicated hacking tools because the payoff is too small to justify the work.
So how do smart homes get hacked? Here are the real attack paths and how they work.
Common ways smart homes get attacked
Smart homes face a handful of digital threats, but most come from broad automated attacks rather than someone targeting your house.
1) Automated online attacks
Bots constantly scan the internet for weak passwords and outdated logins. These brute force attacks throw billions of guesses at connected accounts. When one works, the device becomes part of a botnet used for future attacks. That doesn’t mean someone is targeting your home on purpose. Bots search for anything they can breach. A strong password stops them.
2) Phishing attempts
Some phishing emails impersonate smart home brands. Clicking a fake link or sharing login details can open the door for criminals to reach your network. Even a general phishing attack can expose your Wi-Fi info and lead to broader access.
3) Data breaches from IoT companies
Hackers often go after company servers, not individual homes. These breaches may expose account details or stored camera footage kept in the cloud. Criminals may sell that data to others who might try to use it. It rarely leads to direct smart home hacking, but it still puts your accounts at risk.
4) Attacks on device communications
Early IoT devices had vulnerabilities that allowed criminals to intercept the data they sent and received. (IoT stands for Internet of Things and includes everyday connected gadgets like smart plugs, smart thermostats or Wi-Fi cameras.) Modern products now use stronger encryption, making these attacks extremely rare in the real world.
5) Bluetooth malware
Bluetooth issues still pop up from time to time, but most modern smart home devices use stronger security than older models. When a new flaw is discovered, companies usually release fast patches, which is why it’s important to keep your apps and gadgets updated. Today, these Bluetooth risks rarely lead to real smart home problems.
ADT HACKED: IS YOUR HOME SECURITY SYSTEM REALLY SECURE?
Who actually tries to hack smart homes
When hacking happens, it usually involves someone with some level of access already. In many cases, no technical hack occurs at all.
Simple steps like stronger Wi-Fi security and regular updates go a long way toward protecting connected devices. ( Al Drago/Bloomberg via Getty Images)
A relation or acquaintance
Exes, former roommates or relatives often know login info. They may try to spy or cause trouble. Update all passwords if you suspect this.
Untrustworthy employees
There have been cases where employees at security companies snooped through camera feeds. This isn’t remote hacking. It’s a misuse of internal access.
Data thieves
They steal account lists and login details to sell. Others may buy those lists and try to log in using exposed credentials.
Blackmail scammers
Some send fake messages claiming they hacked your cameras and threaten you. Most of these scams rely on lies because they have no access at all.
Foreign governments
Some banned foreign manufacturers pose surveillance risks. The FCC maintains a list of companies that cannot sell security tech in the U.S. Always check that list before buying unfamiliar brands.
Smart home devices that can raise concerns
Some everyday gadgets create small but real entry points for trouble, especially when their settings or security features get overlooked.
Smart fridges
They often arrive with default passwords that owners forget to change. Older models may use outdated IoT protocols with weaker protections. Many do not get frequent security updates.
Wi-Fi baby monitors
Wi-Fi offers convenience but also adds risk. Weak routers and poor passwords can allow strangers to access a feed. Closed network monitors avoid Wi-Fi risks but still face basic signal interception attempts.
Smart bulbs
During setup, some bulbs broadcast an open temporary network. If a criminal joins at the exact right moment, they could reach the rest of your devices. These cases are rare but possible in theory.
Smart speakers
Voice ordering can be exploited by curious kids or guests. Set a purchase PIN so no one can order items with simple voice commands.
Steps to stay safe in your smart home
Strong habits and a few simple tools can block the most common threats that target connected homes.
1) Use strong passwords
Choose long, complex passwords for your Wi-Fi router and smart home apps. A password manager makes this simple. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse.
Next, see if your email has been exposed in past breaches. Our No. 1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.
Check out the best expert-reviewed password managers of 2025 at Cyberguy.com
2) Turn on two-factor authentication
Brands like Ring and Blink already use it. Add two-factor authentication (2FA) to every account that supports it.
3) Use a reputable data removal service
Removing your personal details from data broker sites helps prevent criminals from using leaked or scraped information to access your accounts or identify your home.
While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com
4) Add strong antivirus software on phones and computers
Strong antivirus protection blocks malware that could expose login details or give criminals a path into the devices that manage your smart home. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com
Choosing brands with clear privacy practices and local storage options helps keep your home and data in your control. (CyberGuy.com)
5) Choose brands with strong encryption
Pick smart home products from companies that explain how they protect your data and use modern encryption to lock down your footage and account details. Look for brands that publish clear security policies, offer regular updates and show how they keep your information private.
6) Store sensitive footage locally
Pick security cameras that let you save video directly to an SD card or a home hub, rather than uploading it to the cloud. This keeps your recordings under your control (and helps protect them if a company server is breached). Many cameras from trusted lines support local storage, so you do not have to rely on a company server.
7) Keep devices updated
Install firmware updates quickly. Enable automatic updates when possible. Replace older gadgets that no longer receive patches.
8) Secure your Wi-Fi
Your router is the front door to your smart home, so lock it down with a few simple tweaks. Use WPA3 encryption if your router supports it, rename the default network, and install firmware updates to patch security holes. For a full step-by-step guide on tightening your home network, check out our instructions in “How to set up a home network like a pro.”
Kurt’s key takeaways
Smart homes feel intimidating when scary headlines surface. But when you look at real-world data, you see far fewer risks than the stories suggest. Most attacks rely on weak passwords, poor router settings or old devices. With the right habits, your smart home can stay both convenient and secure.
What smart home risk concerns you most, and what part of your setup makes you nervous? Let us know by writing to us at Cyberguy.com
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
Skylight’s 15-inch smart calendar is down to its lowest price to date
When you’re juggling more than just your own calendar, staying organized can be overwhelming. Fortunately, the Skylight Calendar 2 can help simplify things by syncing multiple calendars in a single spot, and now through May 7th, it’s available directly from Skylight for $259.99 ($40 off), its best price to date.
Skylight’s 15-inch smart calendar improves upon the original with a brighter screen, faster performance, and a slimmer design with swappable magnetic frames. Otherwise, though, it offers the same core experience, making it easy for the whole family to see events at a glance, whether you mount it on a wall or place it on a kitchen counter using the included adjustable stand. It automatically syncs with Google, Apple, Yahoo, Outlook, and Cozi calendars, pulling them into a single shared space that updates automatically. Each household member gets their own color, too, so it’s easy to keep track of who’s doing what.
In addition to event planning, the Calendar 2 makes it easier to arrange and assign other day-to-day tasks. You can create and manage shared chore charts, grocery lists, and to-do lists directly on the touchscreen device or through the mobile app for Android and iOS, which makes it easy for everyone in your household to stay on track and contribute. Skylight also provides detailed weather forecasts for your events, so you know what to expect before heading out.
If you subscribe to Skylight’s Calendar Plus plan, the Calendar 2 takes even more of the work off your plate. You can forward emails, upload PDFs, or snap photos of flyers and automatically turn them into calendar events. You also get meal planning tools that let you plan breakfast, lunch, dinner, and snacks for the week, as well as the ability to assign chores and reward kids for completing them. Plus, just for fun, there’s a screensaver mode that turns the display into an ad hoc digital photo frame when it’s not actively being used as a calendar.
Technology
Anthropic’s Mythos AI found over 2,000 unknown software vulnerabilities in just seven weeks of testing
NEWYou can now listen to Fox News articles!
There is a new AI model called Mythos. Anthropic built it for defensive cybersecurity research. It is so effective at finding software vulnerabilities that Anthropic decided the general public cannot have it.
Instead, it is letting a small circle of trusted partners like Microsoft and Google experiment with it first under controlled conditions, while researchers figure out what guardrails need to exist.
That decision alone should tell you something. When the company that built a tool decides the world is not ready for it, you pay attention. And when you understand what Mythos actually did during testing, that caution starts to make complete sense.
WINDOWS PCS AT RISK AS NEW TOOL DISARMS BUILT-IN SECURITY
Sign up for my FREE CyberGuy Report
- Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
- For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com — trusted by millions who watch CyberGuy on TV daily.
- Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
Anthropic’s Mythos AI uncovered more than 2,000 unknown software vulnerabilities in just seven weeks, showing how fast AI can now expose hidden weaknesses. (Gabby Jones/Bloomberg via Getty Images)
How Anthropic’s Mythos AI found 2,000 vulnerabilities in seven weeks
Seven weeks. One AI model. One team. More than 2,000 previously unknown software vulnerabilities were found. If you need a moment with that, take it. John Ackerly, CEO and co-founder of Virtru, a data security company, put that figure into perspective in a way that is hard to shake.
“Mythos is absolutely a turning point for cybersecurity. Think about it. Mythos didn’t pick a lock; it found thousands of locks that were never locked in the first place (that no one even knew existed) in software that the best human security researchers had studied for decades.
The math is staggering. One AI model, and one team, in seven weeks, found more than 2,000 zero-day vulnerabilities. That is 30% of the world’s entire annual output prior to AI. When thousands of researchers get access to AI models like Mythos, a single year will surface exponentially more zero-days than the 360,000 recorded in all of software history.
Mythos and other AI models like it can now find and exploit software flaws at a speed and scale that is beyond containment. This means that the old approach of building stronger walls around systems and hoping they hold is becoming much less reliable. It also means that the manual “find a vulnerability, patch the vulnerability” process is not going to keep pace with a threat landscape bolstered by the speed and scale of AI.
The threat surface is now expanding faster than any wall can contain it. The only answer to this new dynamic is to protect the data itself, rather than prop up perimeter protection around it.
Thirty percent of the world’s annual output in seven weeks changes the game entirely.
What makes Mythos AI different from other AI security tools
Cybersecurity teams have used AI tools for years. So, what makes this different?
Ackerly explains it this way: “What makes this different is the level of autonomy and speed it enables. Mythos is being described as a system that can discover vulnerabilities and even generate working exploits much faster than traditional human-led workflows. This model could make it easy for a bad actor to identify and exploit vulnerabilities in software, even if that bad actor isn’t knowledgeable or trained.”
That last part matters most. Before a tool like this, exploiting a serious software vulnerability required real technical skill. Mythos AI lowers that barrier significantly. A person with bad intentions and no technical background could potentially use a model like this to cause serious damage. The expertise gap that once offered some natural protection is closing.
FAKE PAYPAL EMAIL LET HACKERS ACCESS COMPUTER AND BANK ACCOUNT
Security experts warn that tools like Mythos could shrink the time it takes to find and exploit flaws from weeks down to minutes. (Patrick Sison/AP Photo)
Why Anthropic’s Mythos AI is breaking down perimeter security
Most cybersecurity spending, the overwhelming majority of it, goes toward what experts call perimeter defense. Think firewalls, network monitoring, endpoint security and intrusion detection. The entire strategy is built on one core idea of keeping the bad actors out, and the data inside stays safe.
Ackerly describes how that model is now breaking down.
“The perimeter is the digital wall around your systems and the information you possess. For decades, cyber strategies have primarily focused on the idea that if you protected the perimeter well enough — if you built a strong enough wall — the sensitive data on the inside would stay safe,” Ackerly said.
“The industry has poured hundreds of billions of dollars into firewalls, endpoint detection, network security, application security and other perimeter defenses. Traditional security architecture by itself cannot keep pace in this new world.
“The Mythos development from Anthropic is making a hard truth very apparent: Time is running out for companies to prepare for this new reality. Shifting focus from ‘protecting the perimeter’ to ‘protecting the data’ is critically important to mitigate data loss or compromise.”
Hundreds of billions of dollars. And now the model those dollars were built on is becoming unreliable. It forces a full rethink.
Does Anthropic’s Mythos AI give attackers the advantage?
This is the question everyone wants a straight answer to. Ackerly offers one that is more nuanced than a simple yes or no.
“I wouldn’t frame it as attackers automatically having an advantage. But, over time, it does mean that ‘bad guys’ and ‘good guys’ will have access to essentially the same tools. As a result, I do think defenders absolutely need a different strategy. If you assume the outer wall may fail, then the smarter move is to protect the data itself so it stays controlled even after a breach.”
The playing field is leveling. And that may sound fair until you remember attackers only need to succeed once, while defenders have to succeed every time.
How fast is Mythos AI changing the cybersecurity threat landscape?
Speed is what makes Mythos AI genuinely alarming. Traditional cyberattacks move through a lifecycle. Reconnaissance takes time. Finding the right vulnerability takes more time. Building an exploit takes more time on top of that.
Ackerly explains what happens when AI compresses all of that.
“AI is accelerating the threat. A model that can find and exploit vulnerabilities autonomously compresses the attack lifecycle from weeks to hours, or even minutes. Every layer of the traditional security stack now has to operate at machine speed. Manual security architectures cannot keep up.
“But AI also makes data-centric security more powerful, not less so. When every piece of sensitive data is protected at the object-level, AI agents can enforce governance at scale by checking entitlements, applying attribute-based access controls, and auditing data flows in real time. The same capabilities that make Mythos a dangerous tool in the hands of ‘bad guys’ make it a valuable tool in the hands of ‘good guys.’”
The question organizations should be asking shifts from “how do I build higher walls?” to “when the walls fail, is my data still protected?” That is the question worth sitting with.
What Mythos AI means for regular people’s personal data
Most of the Mythos coverage has focused on corporate risk. But your bank account and medical records sit in those same vulnerable systems.
“For everyday people, the first change is that breaches and scams could become more frequent, more targeted, and harder to spot. If AI makes it easier to uncover weak points in the systems we all rely on, that can translate into more pressure on the services that hold our personal data, from email and cloud storage to health, banking, and retail platforms.
Consumers shouldn’t assume a company is doing the right thing with their data. Now, they really can’t assume a company’s outer defenses are enough to protect their information.
This also highlights the importance of basic cyber hygiene like unique passwords and MFA, so that when breaches happen, the scope of impact on your own personal data is contained.”
Your bank account, your medical records, your tax documents, your private messages. All of it already lives across dozens of platforms you trust to protect it. If those platforms’ outer defenses are no longer reliable, what exactly is standing between your data and someone who wants it?
Ackerly goes further on where the exposure actually lives. “Data now travels across clouds, devices, partners, and borders. The risk isn’t just one hacked server in one building anymore. It’s all the places your data passes through or gets copied to along the way.
Was Anthropic right to keep Mythos AI restricted?
Anthropic made a choice that is rare in the AI industry. They built something powerful and then decided not to release it widely.
On that decision, Ackerly is direct. “Anthropic’s decision to withhold Mythos from general release is unprecedented and, frankly, responsible. Time will tell what these partners are able to do with regard to safety, but releasing it to the general public would certainly have been ill-advised and dangerous.”
Unprecedented. That word deserves weight here. In an industry that races to release new tech, Anthropic stopped. That speaks volumes.
We reached out to Anthropic for a comment, but did not hear back before our deadline.
THIRD-PARTY BREACH EXPOSES CHATGPT ACCOUNT DETAILS
As AI accelerates cyberattacks, the focus is shifting from protecting networks to protecting the data itself. (Kury “CyberGuy” Knutsson)
How to stay safe as cybersecurity shifts
The perimeter model is deteriorating, but that does not mean you are helpless. Individual behavior still matters, and it matters more now than it did before.
Ackerly’s recommendation is this: “Stop assuming the app, platform, or company perimeter can always protect your information, or that they will do the right thing with your data. People should be much more deliberate about what data they share, where they store it, and who can access it. Protection needs to travel with the data, not just sit at the edge of a network. For you, that means choosing services that give you stronger control over your information and being more cautious about oversharing sensitive data in the first place. The data owner should always have governance over said data.” So where do you start?
1) Use unique passwords for every account
A password manager makes this realistic. If one platform gets breached, unique passwords keep the damage isolated to that one account.
2) Turn on multi-factor authentication wherever it is available
Multi-factor authentication (MFA) adds a layer that survives even when a password is compromised. It is one of the highest-impact steps an individual can take.
3) Run strong antivirus software and keep devices updated
Outdated software is one of the most common entry points attackers use. Strong antivirus software catches threats your instincts might miss, and keeping apps and operating systems current closes the gaps that models like Mythos are built to find. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com
4) Be selective about what you share and where
Every app that holds your data is a potential exposure point. The less you overshare, the smaller your footprint becomes.
5) Use a data removal service
Data brokers collect and sell your personal information, often without you ever knowing. Data removal services find where your data is listed and request its removal. You cannot control every place your information travels, but you can shrink the trail it leaves behind. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com
6) Choose services that offer real data control
Not all platforms treat your data the same way. Look for services that let you see, manage and limit how your information is used and where it goes.
7) Monitor your accounts and credit
Catching a breach early limits the damage significantly. Set up account alerts wherever your bank or financial platform allows it. A credit freeze costs nothing and stops new accounts from being opened in your name without your knowledge.
8) Stay skeptical of phishing attempts
Ackerly warned that scams will get more targeted and harder to spot as AI lowers the barrier for bad actors. Scrutinize every link before you click it and treat unexpected emails or texts asking for login information as suspicious by default. If something feels off, it probably is.
9) Assume breaches will happen
The goal is to limit how much damage they can do. When you operate with that assumption, your decisions about data hygiene get sharper, and your exposure gets smaller.
Take my quiz: How safe is your online security?
Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Kurt’s key takeaways
Mythos did not create the vulnerability problem. It made the scale of it visible in a way that is no longer ignorable. The foundation of modern cybersecurity, the idea that strong enough walls will keep data safe, is being tested in real time by a technology that moves faster than any human team can. That is a consumer story as much as it is a corporate one. Your data lives in systems built on that old model.
And the moment to think differently about how it is protected is now, not after the next major breach makes the headlines. Anthropic made a responsible call by limiting access to Mythos. But the model exists. The capability is real. Other versions of it are being developed. The question for every organization and every individual becomes the same one Ackerly keeps returning to.
When the walls fail, and experts are telling us they will, what is actually protecting your data on the other side? Let us know your thoughts by writing to us at Cyberguy.com
Sign up for my FREE CyberGuy Report
- Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
- For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily.
- Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Trump fires the entire National Science Board
Multiple sources are reporting that the Trump administration has dismissed the entire National Science Board (NSB). The NSB advises the president and Congress on the National Science Foundation (NSF), which has already been funding research at historically low levels and has seen significant delays in doling out that funding. The NSF has been fundamental in helping develop technology used in MRIs, cellphones, and it even helped get Duolingo get off the ground.
In a statement, Zoe Lofgren, the ranking Democrat on the House Science, Space, and Technology Committee, said:
“This is the latest stupid move made by a president who continues to harm science and American innovation. The NSB is apolitical. It advises the president on the future of NSF. It unfortunately is no surprise a president who has attacked NSF from day one would seek to destroy the board that helps guide the Foundation. Will the president fill the NSB with MAGA loyalists who won’t stand up to him as he hands over our leadership in science to our adversaries? A real bozo the clown move.”
-
Politics4 minutes agoShooting Prompts Discussions About King Charles III and Queen Camilla’s U.S. Visit
-
Business10 minutes agoRising Costs Are Causing Couples to Delay or Forgo Having Children
-
Science16 minutes agoTargeted Hunts Were Supposed to Curb ‘Zombie Deer Disease.’ Now What?
-
Health22 minutes agoVideo: Skyrocketing Health Insurance Forces Americans to Scramble for Care
-
Culture34 minutes agoBook Review: ‘Ghost Town,’ by Tom Perrotta
-
Lifestyle40 minutes agoCan the Reinvented Delano Hotel Resuscitate South Beach?
-
Technology52 minutes agoSkylight’s 15-inch smart calendar is down to its lowest price to date
-
World58 minutes agoWorld leaders condemn ‘unacceptable’ violence after armed attack disrupts WH Correspondents’ Dinner