Best Home Security Companys

133 Companies 7,178 Real Customer Reviews

A Major Home Security Flaw that Could Give Crooks Easy Access to Your Home

Posted By:  |  January 6, 2016  |  0 Comment(s)

With rapid advancements in wireless communications technology, providing your home with complete, state-of-the-art home security features has never been easier or more affordable. Now, rather than retrofitting your home with yards and yards of intrusive wiring and other cumbersome security devices, installing your home security system can involve little more than plugging in a device and wirelessly syncing it to your central security hub, similar to how your computer syncs with your WiFi router.

However, researchers have discovered that a completely wireless home security system may not grant you as much protection as you think. In a recent blog post, cybersecurity firm Rapid7 revealed a vulnerability in Comcast’s Xfinity Home Security System that could allow tech-savvy home invaders to simply walk through the front door of the home without being detected! And although this fatal security flaw was originally discovered in Comcast’s security system, experts agree that similar security systems could also run this risk.

Visit Our Top Recommended Company

How Crooks Can Bypass a Wireless System

While it should be noted that Comcast is responding to this research by working with industry partners and other home security providers to create solutions to the problem, Rapid7’s findings are no less startling. One of the main reasons Comcast’s system, which employs ZigBee communications protocols (considered the gold standard among home security and home automation experts), is so vulnerable is that it does not maintain proper or regular security checks across its various devices. Minutes and even hours can transpire between security checks, meaning a thief with a knowledge of the system could potentially slip into and out of the house before the system raises an alarm.

When testing Comcast’s security measures, the experts at Rapid7 discovered two ways burglars could exploit the system:

Wireless Radio Frequency Jamming

Simply put, a wireless radio jammer sends out a signal that prevents wireless communications devices from talking to each other.The possession or use of radio jammers is illegal under federal law. To demonstrate just how easily a home invader could circumvent the system, a researcher simulated an attack on a window sensor using a radio jammer. Despite the sensor indicating an “armed” status, the researcher was able to open the window without alerting the security protocol. What more, the device was unable to report the incident to the central hub once communication was reestablished, as though the break-in had never occurred.

Software-Based De-Authentication

While requiring a bit more expertise than simply turning on a radio jammer, researchers also discovered a weakness in the ZigBee protocol itself. This method, known as a de-authentication attack, involves the home invader using software to disconnect the system user from the system. The crook then can gain access to passwords, and let himself in that way.

What to Look For in a Home Security System

phone

It’s true this issue has raised industry-wide concerns; however, it is not common among all home security providers. Here at BestHomeSecurityCompanys.com, we’ve investigated some of the biggest names in home security, such as Protect America, SimpliSafe, and Vivint, providing expert reviews to help you made a smarter decision. According to our research, there are a number of factors to consider that will help you make the best choice for your home security needs:

Monitoring Options

Although wireless monitoring tends to be the preferred monitoring method, as has been demonstrated, it is not always the best. And not all wireless security systems are created equal. For example, Protect America’s wireless security system schedules frequent alarm tests and other precautions to make sure devices are communicated with one another accurately. As you weight your home security options, it’s important to look at both how and how often the system monitors your home. If the security company features wireless monitoring, how responsive are its communications protocols? How soon before you or the authorities are notified of a break-in or other house emergency such as a fire, flood, or carbon monoxide leak?

Equipment and Technology

In an effort to release functioning products on the market as fast as possible, some companies may overlook the crucial step of bolstering their equipment with necessary cybersecurity procedures. As you consider which home security company is right for you, be sure to ask about the company’s equipment. Outdated or poor-functioning equipment is susceptible to hackers and could cost you more than the price of the system should it fail.

Customer Reviews

You can also tell a lot about a company by what its customers have to say about it. Here at BestHomeSecurityCompanys.com, we have collected over 4,000 home security company reviews from actual customers! These honest reviews will give you a good idea of how the company treats its customers, and what you can expect once you sign up.

Compare Home Security Companies

Looking For a Security System?

Disclosure:

We try to partner with all companies that we review, and may get compensated when you click, or call them from our site. But don't worry, we don't artificially rank or score companies based on compensation, or agreements. A company's rank is earned through our organic Ranking Criteria for each industry. Period. And we're mighty proud of that.

HOME SECURITY BY STATE

Want Us to Review a Company?

If there is a home security company that you don't see on our site, and would like us to review, please contact us.

REAL REVIEWS (YES THEY’RE REAL)

With so many home security companies out there, and a lack of sites willing to bring you the HONEST breakdowns of each company, what source can you turn to for the real information you can trust?

We are dedicated to bringing the truth out, and rank home security companies as they should be. Through our investigation, and experience with each company, we rank each company, and bring you our honest, unbiased opinion. We also include authentic user reviews by past customers of each company that are moderated and verified.

Like many sites, we are compensated through affiliate relationships with each company we review, however all of our rankings are based on our 9-Point Ranking Criteria.

All reviews are subject to moderation and approval. Any reviews that may resemble false information, or competitors of another company will need to be verified by our staff before being approved and published. We reserve the right to approve or deny any reviews left on this site.