Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Privacy

Google’s Nest Hub Has a Microphone It Forgot to Mention

Google said Wednesday it forgot to mention that it included a microphone in its Nest Secure home alarm system, the latest privacy flub by one of the tech industry’s leading collectors of personal information.

Google said Wednesday it forgot to mention that it included a microphone in its Nest Secure home alarm system, the latest privacy flub by one of the tech industry’s leading collectors of personal information.

The company said earlier this month that its voice assistant feature would be available on the system’s Nest Guard, which controls home alarm sensors.

But Google hadn’t told consumers about the device’s built-in microphone when it began selling the hubs in the fall of 2017. As recently as January, the product specs for the device made no mention of a microphone.

Google said in a statement that the omission was a mistake. “The on-device microphone was never intended to be a secret and should have been listed in the tech specs,” it said.

The microphone hasn’t been active since launch, and people have to specifically enable it going forward, Google said. Business Insider first reported the microphone had been missing from the product’s description.

Google and other Internet companies are facing increasing scrutiny over their data collection practices. The forgotten microphone is not Google’s first run-in with user privacy concerns.

An AP investigation last year found the company was tracking users’ location information through its apps and search services, even if users turned the feature off.

And in 2010, Google admitted it had accidentally collected some internet activity from open Wi-Fi networks using its Street View cars.

Advertisement. Scroll to continue reading.
Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...

Privacy

Many in the United States see TikTok, the highly popular video-sharing app owned by Beijing-based ByteDance, as a threat to national security.The following is...

Privacy

Employees of Chinese tech giant ByteDance improperly accessed data from social media platform TikTok to track journalists in a bid to identify the source...

Application Security

Open banking can be described as a perfect storm for cybersecurity. At one end, small startups with financial acumen but little or no security...

Mobile & Wireless

As smartphone manufacturers are improving the ear speakers in their devices, it can become easier for malicious actors to leverage a particular side-channel for...

Government

The proposed UK Online Safety Bill is the enactment of two long held government desires: the removal of harmful internet content, and visibility into...