{"id":8033,"date":"2017-03-09T12:11:42","date_gmt":"2017-03-09T20:11:42","guid":{"rendered":"https:drivesaversdatarecovery.com\/\/?p=8033"},"modified":"2023-12-18T04:29:17","modified_gmt":"2023-12-18T12:29:17","slug":"danger-lurking-inside-smart-houses","status":"publish","type":"post","link":"https:\/\/drivesaversdatarecovery.com\/nb-no\/blog\/danger-lurking-inside-smart-houses\/","title":{"rendered":"Danger Lurking Inside Smart Houses"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><i><span style=\"font-weight: 400;\">By Michael Hall, Chief Information Security Officer<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">If the advanced technology in our everyday lives was directed against us, who would win in a battle pitting humanity against smart machines?<\/span><br \/>\n<span style=\"font-weight: 400;\">If you consider the rapid rise of the Internet of Things (IoT), this imagined scene isn\u2019t as farfetched as you might think.<\/span><\/p>\n<h2>Fiction?<\/h2>\n<p><span style=\"font-weight: 400;\">This scary situation has already been described by several science fiction writers, like Ray Bradbury.<\/span><br \/>\n<span style=\"font-weight: 400;\">In the \u201cVeldt,\u201d a short story written in 1950, Bradbury describes the actions of an automated house that is programmed by children to kill their parents when they try to discipline them.<\/span><br \/>\n<span style=\"font-weight: 400;\">In another story published that same year, \u201cThere Will Come Soft Rains,\u201d the author<\/span><br \/>\n<span style=\"font-weight: 400;\">describes a computer-controlled house that automatically supplies all of the needs of its owners, even after they perish in an apparent nuclear disaster.<\/span><br \/>\n<span style=\"font-weight: 400;\">Other stories, where inanimate objects start to act out on their own without human direction, are equally frightening.<\/span><br \/>\n<span style=\"font-weight: 400;\">Remember the sentient computer called Hal in the movie \u201c2001: A Space Odyssey\u201d? Hal tries to take over a mission to Jupiter by killing the human crew.<\/span><br \/>\n<span style=\"font-weight: 400;\">Halfway through the mission, Hal stops taking orders from the crew and strikes out on its own. The computer disables life support on crew members in deep sleep, cuts the cord on another crew member taking a space walk and tries to terminate the last crew member before he can shut the nearly omnipotent machine down.<\/span><br \/>\n<span style=\"font-weight: 400;\">The actions were taken because the computer began to see humans as a weak link in the mission, which made them expendable.<\/span><\/p>\n<h2>Fact?<\/h2>\n<p><span style=\"font-weight: 400;\">Today\u2019s reality isn\u2019t so grim, but it is a brave new world with a growing legion of new Internet-attached devices that many of us use every day, on many levels. Nobody\u2019s being attacked by their remote control garage door opener&#8230;yet. But any webcam, baby monitor, thermostat, personal assistant or other device with an Internet connection, in theory, could be turned against the user. Fiction is now fact.<\/span><br \/>\n<span style=\"font-weight: 400;\">A collection of IoT devices were used by hackers last Fall to stage massive DDOS (Distributed Denial of Service) attacks on numerous commercial websites. Since many of these devices have weak or non-existent password-protection, gaining control by an experienced hacker is relatively simple.<\/span><\/p>\n<h2>What You Can Do<\/h2>\n<p><span style=\"font-weight: 400;\">Technology is an everyday part of life today and is necessary for home, school and business. It\u2019s important for you to be familiar with how to use current devices as modes of communication.<\/span><br \/>\n<span style=\"font-weight: 400;\">Here are some ways to improve cybersecurity within your home.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Understand Your Devices<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">You should know the answers to these questions:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Does the device have a camera?<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Can it transmit or receive pictures?<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Does it have a phone book or contact list?<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Can it download apps? What do the apps have access to (photos, contacts, etc.)?<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Can you communicate with other people through the device?<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Does the device post to the web?<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Does the device have a dashboard? If so, is the dashboard part of the installed software or is it online?<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">What kind of information can be shared with other people online?<\/span><\/li>\n<\/ul>\n<h3><span style=\"font-weight: 400;\">Keep Up with Device Updates<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Updates and patches often include new security protocols and fixes for security loopholes. Stay on top of these.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Passwords and Logins<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Change the default login credentials on each device, create complex passwords and change them regularly. Also make sure that your home Wi-Fi is password protected so that outsiders cannot easily access it.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Educate and Enforce<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Education is absolutely the most important part of cybersecurity in your home. Teach your children about the dangers of their devices and how to stay safe. Write down rules and enforce them. For example:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Do not use public Wi-Fi<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Enable parental controls and settings<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Never share any personal information or pictures with strangers<\/span><\/li>\n<\/ul>\n<h2>Continually New World<\/h2>\n<p><span style=\"font-weight: 400;\">The growing list of internet-enabled gadgets for the family and home\u2014like doorbell cameras, remote-controlled thermostats, internet-enabled garage door openers, camera-equipped drones, appliances like refrigerators with memory and email abilities, dishwashers that start and stop by remote control\u2014continues to expand. <\/span><br \/>\n<span style=\"font-weight: 400;\">Wi-Fi enabled gadgets open our world in ways we could never dream of just a decade ago. We know what we need from the store without opening the refrigerator, know our kids are home safe without picking up the phone and can turn the lights on or the heat up when we\u2019re headed home from work. Just make sure you\u2019re taking responsible measures to keep your home and family safe at the same time.<\/span><br \/>\n<span style=\"font-weight: 400;\">For updates on what\u2019s coming next to IoT land, check out <\/span><a href=\"https:\/\/thegenai.co\/\"><span style=\"font-weight: 400;\">http:\/\/iotlist.co\/<\/span><\/a><span style=\"font-weight: 400;\">, which lists many new devices coming into the IoT fold.<\/span><\/p>\n<h2>Related Articles<\/h2>\n<p><a href=\"https:\/\/drivesaversdatarecovery.com\/nb-no\/warning-internet-of-things-holds-hidden-dangers\/\"><span style=\"font-weight: 400;\">Warning: Internet of Things Holds Hidden Dangers<\/span><\/a><br \/>\n<a href=\"https:\/\/drivesaversdatarecovery.com\/nb-no\/11-tips-for-a-stronger-password\/\"><span style=\"font-weight: 400;\">12 Tips for a Stronger Password<\/span><\/a><br \/>\n<a href=\"https:\/\/drivesaversdatarecovery.com\/nb-no\/wi-fi-enabled-childrens-toys-5-safety-tips\/\"><span style=\"font-weight: 400;\">Wi-Fi Enabled Children\u2019s Toys: 5 Safety Tips<\/span><\/a><br \/>\n<a href=\"https:\/\/drivesaversdatarecovery.com\/nb-no\/digital-forensics-vulnerabilities-beyond-the-computer\/\"><span style=\"font-weight: 400;\">Digital Forensics: Vulnerabilities Beyond The Computer<\/span><\/a><br \/>\n<a href=\"https:\/\/drivesaversdatarecovery.com\/nb-no\/more-wearables-mean-more-security-concerns-2\/\"><span style=\"font-weight: 400;\">More Wearables Mean More Security Concerns<\/span><\/a><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"By Michael Hall, Chief Information Security Officer If the advanced technology in our everyday lives was directed against us, who would win in a battle pitting humanity against smart machines? If you consider the rapid rise of the Internet of Things (IoT), this imagined scene isn\u2019t as farfetched as you might think. Fiction? This scary&hellip;","protected":false},"author":30,"featured_media":48166,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[264],"tags":[190,143],"post_series":[],"class_list":["post-8033","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-cybersecurity","tag-security","entry","has-media"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.9 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Danger Lurking Inside Smart Houses<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/drivesaversdatarecovery.com\/nb-no\/blog\/danger-lurking-inside-smart-houses\/\" \/>\n<meta property=\"og:locale\" content=\"nb_NO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Danger Lurking Inside Smart Houses\" \/>\n<meta property=\"og:url\" content=\"https:\/\/drivesaversdatarecovery.com\/nb-no\/blog\/danger-lurking-inside-smart-houses\/\" \/>\n<meta property=\"og:site_name\" content=\"DriveSavers Data Recovery Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DriveSavers\" \/>\n<meta property=\"article:published_time\" content=\"2017-03-09T20:11:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-18T12:29:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2017\/03\/DB-DANGER-LURKING-INSIDE-SMART-HOUSES-scaled-e1699256298277.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1046\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michelle West\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@drivesavers\" \/>\n<meta name=\"twitter:site\" content=\"@drivesavers\" \/>\n<meta name=\"twitter:label1\" content=\"Skrevet av\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michelle West\" \/>\n\t<meta name=\"twitter:label2\" content=\"Ansl. lesetid\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/danger-lurking-inside-smart-houses\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/danger-lurking-inside-smart-houses\\\/\"},\"author\":{\"name\":\"Michelle West\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/person\\\/8319da503f7e4ddd51903b6d8295be1c\"},\"headline\":\"Danger Lurking Inside Smart Houses\",\"datePublished\":\"2017-03-09T20:11:42+00:00\",\"dateModified\":\"2023-12-18T12:29:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/danger-lurking-inside-smart-houses\\\/\"},\"wordCount\":826,\"publisher\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/danger-lurking-inside-smart-houses\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2017\\\/03\\\/DB-DANGER-LURKING-INSIDE-SMART-HOUSES-scaled-e1699256298277.jpg\",\"keywords\":[\"cybersecurity\",\"security\"],\"articleSection\":[\"DriveSavers Blog\"],\"inLanguage\":\"nb-NO\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/danger-lurking-inside-smart-houses\\\/\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/danger-lurking-inside-smart-houses\\\/\",\"name\":\"Danger Lurking Inside Smart Houses\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/danger-lurking-inside-smart-houses\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/danger-lurking-inside-smart-houses\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2017\\\/03\\\/DB-DANGER-LURKING-INSIDE-SMART-HOUSES-scaled-e1699256298277.jpg\",\"datePublished\":\"2017-03-09T20:11:42+00:00\",\"dateModified\":\"2023-12-18T12:29:17+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/danger-lurking-inside-smart-houses\\\/#breadcrumb\"},\"inLanguage\":\"nb-NO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/danger-lurking-inside-smart-houses\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nb-NO\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/danger-lurking-inside-smart-houses\\\/#primaryimage\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2017\\\/03\\\/DB-DANGER-LURKING-INSIDE-SMART-HOUSES-scaled-e1699256298277.jpg\",\"contentUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2017\\\/03\\\/DB-DANGER-LURKING-INSIDE-SMART-HOUSES-scaled-e1699256298277.jpg\",\"width\":2000,\"height\":1046},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/danger-lurking-inside-smart-houses\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Danger Lurking Inside Smart Houses\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#website\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/\",\"name\":\"DriveSavers Data Recovery Services\",\"description\":\"The Worldwide Leader in Data Recovery\",\"publisher\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nb-NO\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#organization\",\"name\":\"DriveSavers Data Recovery\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nb-NO\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Logo-01.png\",\"contentUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Logo-01.png\",\"width\":1092,\"height\":1087,\"caption\":\"DriveSavers Data Recovery\"},\"image\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DriveSavers\",\"https:\\\/\\\/x.com\\\/drivesavers\",\"https:\\\/\\\/www.instagram.com\\\/drivesavers\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/drivesavers-data-recovery\\\/\",\"https:\\\/\\\/www.pinterest.com\\\/drivesavers\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCBlynLMdFWQgid-Gwm0zJ1A\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/DriveSavers\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/person\\\/8319da503f7e4ddd51903b6d8295be1c\",\"name\":\"Michelle West\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nb-NO\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c820e118da73c12bbab9f3e84e4787eeda260d6c5c486643e5f474153469c728?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c820e118da73c12bbab9f3e84e4787eeda260d6c5c486643e5f474153469c728?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c820e118da73c12bbab9f3e84e4787eeda260d6c5c486643e5f474153469c728?s=96&d=blank&r=g\",\"caption\":\"Michelle West\"},\"description\":\"DriveSavers Senior Marketing Manager Writing about DriveSavers, data recovery, or another technology-related topic? Contact us.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/west-michelle\\\/\"],\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/nb-no\\\/author\\\/michelle\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Danger Lurking Inside Smart Houses","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/drivesaversdatarecovery.com\/nb-no\/blog\/danger-lurking-inside-smart-houses\/","og_locale":"nb_NO","og_type":"article","og_title":"Danger Lurking Inside Smart Houses","og_url":"https:\/\/drivesaversdatarecovery.com\/nb-no\/blog\/danger-lurking-inside-smart-houses\/","og_site_name":"DriveSavers Data Recovery Services","article_publisher":"https:\/\/www.facebook.com\/DriveSavers","article_published_time":"2017-03-09T20:11:42+00:00","article_modified_time":"2023-12-18T12:29:17+00:00","og_image":[{"width":2000,"height":1046,"url":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2017\/03\/DB-DANGER-LURKING-INSIDE-SMART-HOUSES-scaled-e1699256298277.jpg","type":"image\/jpeg"}],"author":"Michelle West","twitter_card":"summary_large_image","twitter_creator":"@drivesavers","twitter_site":"@drivesavers","twitter_misc":{"Skrevet av":"Michelle West","Ansl. lesetid":"4 minutter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/danger-lurking-inside-smart-houses\/#article","isPartOf":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/danger-lurking-inside-smart-houses\/"},"author":{"name":"Michelle West","@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/person\/8319da503f7e4ddd51903b6d8295be1c"},"headline":"Danger Lurking Inside Smart Houses","datePublished":"2017-03-09T20:11:42+00:00","dateModified":"2023-12-18T12:29:17+00:00","mainEntityOfPage":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/danger-lurking-inside-smart-houses\/"},"wordCount":826,"publisher":{"@id":"https:\/\/drivesaversdatarecovery.com\/#organization"},"image":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/danger-lurking-inside-smart-houses\/#primaryimage"},"thumbnailUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2017\/03\/DB-DANGER-LURKING-INSIDE-SMART-HOUSES-scaled-e1699256298277.jpg","keywords":["cybersecurity","security"],"articleSection":["DriveSavers Blog"],"inLanguage":"nb-NO"},{"@type":"WebPage","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/danger-lurking-inside-smart-houses\/","url":"https:\/\/drivesaversdatarecovery.com\/blog\/danger-lurking-inside-smart-houses\/","name":"Danger Lurking Inside Smart Houses","isPartOf":{"@id":"https:\/\/drivesaversdatarecovery.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/danger-lurking-inside-smart-houses\/#primaryimage"},"image":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/danger-lurking-inside-smart-houses\/#primaryimage"},"thumbnailUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2017\/03\/DB-DANGER-LURKING-INSIDE-SMART-HOUSES-scaled-e1699256298277.jpg","datePublished":"2017-03-09T20:11:42+00:00","dateModified":"2023-12-18T12:29:17+00:00","breadcrumb":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/danger-lurking-inside-smart-houses\/#breadcrumb"},"inLanguage":"nb-NO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/drivesaversdatarecovery.com\/blog\/danger-lurking-inside-smart-houses\/"]}]},{"@type":"ImageObject","inLanguage":"nb-NO","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/danger-lurking-inside-smart-houses\/#primaryimage","url":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2017\/03\/DB-DANGER-LURKING-INSIDE-SMART-HOUSES-scaled-e1699256298277.jpg","contentUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2017\/03\/DB-DANGER-LURKING-INSIDE-SMART-HOUSES-scaled-e1699256298277.jpg","width":2000,"height":1046},{"@type":"BreadcrumbList","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/danger-lurking-inside-smart-houses\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/drivesaversdatarecovery.com\/"},{"@type":"ListItem","position":2,"name":"Danger Lurking Inside Smart Houses"}]},{"@type":"WebSite","@id":"https:\/\/drivesaversdatarecovery.com\/#website","url":"https:\/\/drivesaversdatarecovery.com\/","name":"DriveSavers tjenester for datarekonstruksjon","description":"The Worldwide Leader in Data Recovery","publisher":{"@id":"https:\/\/drivesaversdatarecovery.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/drivesaversdatarecovery.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nb-NO"},{"@type":"Organization","@id":"https:\/\/drivesaversdatarecovery.com\/#organization","name":"DriveSavers Data Recovery","url":"https:\/\/drivesaversdatarecovery.com\/","logo":{"@type":"ImageObject","inLanguage":"nb-NO","@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/logo\/image\/","url":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2021\/08\/Logo-01.png","contentUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2021\/08\/Logo-01.png","width":1092,"height":1087,"caption":"DriveSavers Data Recovery"},"image":{"@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DriveSavers","https:\/\/x.com\/drivesavers","https:\/\/www.instagram.com\/drivesavers\/","https:\/\/www.linkedin.com\/company\/drivesavers-data-recovery\/","https:\/\/www.pinterest.com\/drivesavers\/","https:\/\/www.youtube.com\/channel\/UCBlynLMdFWQgid-Gwm0zJ1A","https:\/\/en.wikipedia.org\/wiki\/DriveSavers"]},{"@type":"Person","@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/person\/8319da503f7e4ddd51903b6d8295be1c","name":"Michelle West","image":{"@type":"ImageObject","inLanguage":"nb-NO","@id":"https:\/\/secure.gravatar.com\/avatar\/c820e118da73c12bbab9f3e84e4787eeda260d6c5c486643e5f474153469c728?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c820e118da73c12bbab9f3e84e4787eeda260d6c5c486643e5f474153469c728?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c820e118da73c12bbab9f3e84e4787eeda260d6c5c486643e5f474153469c728?s=96&d=blank&r=g","caption":"Michelle West"},"description":"DriveSavers Senior Marketing Manager Writing about DriveSavers, data recovery, or another technology-related topic? Contact us.","sameAs":["https:\/\/www.linkedin.com\/in\/west-michelle\/"],"url":"https:\/\/drivesaversdatarecovery.com\/nb-no\/author\/michelle\/"}]}},"_links":{"self":[{"href":"https:\/\/drivesaversdatarecovery.com\/nb-no\/wp-json\/wp\/v2\/posts\/8033","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/drivesaversdatarecovery.com\/nb-no\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/drivesaversdatarecovery.com\/nb-no\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/nb-no\/wp-json\/wp\/v2\/users\/30"}],"replies":[{"embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/nb-no\/wp-json\/wp\/v2\/comments?post=8033"}],"version-history":[{"count":0,"href":"https:\/\/drivesaversdatarecovery.com\/nb-no\/wp-json\/wp\/v2\/posts\/8033\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/nb-no\/wp-json\/wp\/v2\/media\/48166"}],"wp:attachment":[{"href":"https:\/\/drivesaversdatarecovery.com\/nb-no\/wp-json\/wp\/v2\/media?parent=8033"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/nb-no\/wp-json\/wp\/v2\/categories?post=8033"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/nb-no\/wp-json\/wp\/v2\/tags?post=8033"},{"taxonomy":"post_series","embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/nb-no\/wp-json\/wp\/v2\/post_series?post=8033"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}