Skip to content
Techzine Global
  • Home
  • Topstories
  • Topics
    • Analytics
    • Applications
    • Collaboration
    • Data Management
    • Devices
    • Devops
    • Infrastructure
    • Privacy & Compliance
    • Security
  • Insights
    • All Insights
    • Agentic AI
    • Analytics
    • Cloud ERP
    • Generative AI
    • IT in Retail
    • NIS2
    • RSAC 2025 Conference
    • Security Platforms
    • SentinelOne
  • More
    • Become a partner
    • About us
    • Contact us
    • Terms and conditions
    • Privacy Policy
  • Techzine Global
  • Techzine Netherlands
  • Techzine Belgium
  • Techzine TV
  • ICTMagazine Netherlands
  • ICTMagazine Belgium
Techzine » News » Security » Nest forces users to change their password
2 min Security

Nest forces users to change their password

Jim PeddFebruary 18, 2019 6:35 pmSeptember 8, 2019
Nest forces users to change their password

Nest, a subsidiary of Google, forces various users to reset their passwords. Last Friday The Verge was the first to report that Nest has started to force people to reset their passwords.

At first, Nest kindly asked customers whose account might have been hacked to reset their passwords. However, it seems that few customers actually take the trouble. For this reason, the company is now forcing customers to change their passwords. Google neither confirmed nor denied that this choice was made as a result of a new data leak.

Change password

On Twitter, a user asked Nest if the e-mail he had received was real. Also this user had to change his password according to the mail. Nest only confirmed that the mail the user had received was legitimate. Nest also advises the user to use two-step verification, so that the account is extra secure.

It is therefore necessary for users to really act. If they are excluded from their Nest account, they will no longer be able to use the Nest app and will no longer receive notifications from their Nest devices. Mobile notifications if an intruder is in your home, or if your smoke detector detects smoke, do not come back in.

This is true. Please follow the instructions that are in the email so that you can get back into the app. Also the steps to activating 2-step verification are included in the email.

— Google Nest (@googlenest) February 15, 2019

Easy passwords

Problematic remains the fact that many users still use easy passwords. And if they have a difficult password, they often use it on various sites or services. Tim Mackey, a senior technical evangelist at Synopsis, talked to the SiliconAngle site about the problem he believes is inherent in passwords.

According to Mackey, it is simply too complicated for people to enter a strong password on mobile devices. Anyone who has a strong password has ever run into trouble filling in that password correctly on a mobile device, says Mackey. And then you run the risk of being disconnected from your account.

This news article was automatically translated from Dutch to give Techzine.eu a head start. All news articles after September 1, 2019 are written in native English and NOT translated. All our background stories are written in native English as well. For more information read our launch article.

Tags:

Google / hack / Login / Nest / passcode / Reset

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Stay tuned, subscribe!

Nieuwsbrieven*

Related

DMA forces Google to make major changes within EU

Exploit provides access to Google accounts: password change doesn’t help

Google will force legacy users of G Suite to start paying up

Google’s One Tap prompts lets users sign in without passwords

Editor picks

Arm and Nvidia are on the prowl for physical AI’s ‘ChatGPT moment’

Is robotics about to experience an AI breakthrough?

‘Ni8mare’ vulnerability affects n8n platform with a score of 10.0

Security researchers at Cyera have discovered a critical vulnerabilit...

RAG ‘2.0’: the Instructed Retriever links AI agents to the right data

Agentic AI relies on a multitude of technological innovations. One of...

Peak practice, Percona open sources OpenEverest

Percona is now “passing” its Database-as-a-Service (DBaaS) platfo...

Techzine.tv

Qualcomm tells us how ARM chips will disrupt the enterprise PC market

Qualcomm tells us how ARM chips will disrupt the enterprise PC market

Infor's industry-specific ERP strategy and Velocity Suite deep dive

Infor's industry-specific ERP strategy and Velocity Suite deep dive

SAP's AI migration tools from ECC to S/4HANA: faster and cheaper ERP transitions

SAP's AI migration tools from ECC to S/4HANA: faster and cheaper ERP transitions

Salesforce reveals its own Agentic IT Service Platform

Salesforce reveals its own Agentic IT Service Platform

Read more on Security

Sophos CEO sees “cybersecurity poverty line”: what to do about it?
Top story

Sophos CEO sees “cybersecurity poverty line”: what to do about it?

We sit down with Sophos CEO Joe Levy during Pax8 Beyond to discuss, among other things, the progress of the S...

Sander Almekinders December 11, 2025
Trend Micro closes critical vulnerabilities in Apex Central

Trend Micro closes critical vulnerabilities in Apex Central

Trend Micro has fixed three critical vulnerabilities in Apex Central. The most serious, with a CVSS score of ...

Berry Zwets 3 days ago
After investment round, Cyera expands its vision on AI security

After investment round, Cyera expands its vision on AI security

Cyera raised $400 million in a new investment round. This brings the company's valuation to approximately $9 ...

Mels Dees 3 days ago
Why did so many security vendors abandon MITRE’s stresstest?
Top story

Why did so many security vendors abandon MITRE’s stresstest?

This year, MITRE made headlines primarily because its leading vulnerability database was in danger of being d...

Erik van Klinken December 12, 2025

Expert Talks

Cybersecurity in 2026 demands managing human behavior and agentic AI

Cybersecurity in 2026 demands managing human behavior and agentic AI

Most organizations today have more security technology at their dispo...

Digital sovereignty: from buzzword to business imperative

Digital sovereignty: from buzzword to business imperative

Digital sovereignty has outgrown its niche as an IT concern and is no...

Why specialized LLMs are the future of generative AI

ChatGPT and the other GenAI chatbots that have taken the tech world b...

The year of the AI agents: why 2026 is about value, not technology

Microsoft has declared 2026 to be the year of the agent. This is not ...

Tech calendar

Appdevcon

March 10, 2026 Amsterdam

Webdevcon

March 10, 2026 Amsterdam

Dutch PHP Conference

March 10, 2026 Amsterdam

De IT Afdeling van de toekomst

March 31, 2026 Naaldwijk

GITEX ASIA 2026

April 8, 2026 Singapore

SAS Innovate 2026

April 27, 2026 Grapevine

Whitepapers

Experience Synology’s latest enterprise backup solution

Experience Synology’s latest enterprise backup solution

How do you ensure your company data is both secure and quickly recove...

How to choose the right Enterprise Linux platform?

How to choose the right Enterprise Linux platform?

"A Buyer's Guide to Enterprise Linux" comprehensively analyzes the mo...

Enhance your data protection strategy for 2025

The Data Protection Guide 2025 explores the essential strategies and...

Strengthen your cybersecurity with DNS best practices

The white paper "DNS Best Practices" by Infoblox presents essential g...

Techzine Global

Techzine focusses on IT professionals and business decision makers by publishing the latest IT news and background stories. The goal is to help IT professionals get acquainted with new innovative products and services, but also to offer in-depth information to help them understand products and services better.

Follow us

Twitter
LinkedIn
YouTube

© 2026 Dolphin Publications B.V.
All rights reserved.

Techzine Service

  • Become a partner
  • Advertising
  • About Us
  • Contact
  • Terms & Conditions
  • Privacy Statement