The Internet of Things (IoT) is heavily built on the idea of connected households and associated gadgets. Many of the items we own interact with others, making our lives much more convenient. What happens when things go wrong, though? LockState, a provider of smart locks, found that out the hard way...
Posts Tagged: Gadgets
Jeremy Sutter As technology continues to make life more convenient for users, it is making the lives of thieves easier as well. Owners of smart homes are under constant threat of electronic theft and violation. The even scarier part is that sometimes you can’t even tell when you have been hack...
By Shannon Perry Sometimes big threats to consumers’ digital security and privacy come in the form of pre-installed programs, software built into consumer products that creates vulnerabilities that hackers can exploit. Last week, Reuters reported that the Department of Homeland Security issued an ...
By Shannon Perry Google recently released a free Video Quality Report, a means for Internet users to determine the quality of their Internet connections and to compare the speeds of their Internet service provider with other local ISPs. Much of the tech community received the report positively becau...
By Shannon Perry On June 2nd, Mac nerds swarmed the keynote “special event” at Apple’s Worldwide Developers Conference in San Francisco – the annual trade show for Apple developers. Anticipation marked the event, which had the potential to deliver the latest iPhone, a brand new iWatch, or so...
By ShannonPerry Even security applications are not always secure. In April, an application named “Virus Shield” reached the top of Google Play Store’s paid charts – the app was downloaded more than 10,000 times for $3.99. The application’s description boasts the capability to “improve th...
By Bob Gourley Threats to our information are not only from malware or brute force hacks or social engineering. Criminals are motivated to look for every advantage. Sometimes we read about very sophisticated attacks against hardware that require advanced engineering. But attacks don’t really have ...
By Bob Gourley Threats to our information are not only from malware or brute force hacks or social engineering. Criminals are motivated to look for every advantage. Sometimes we read about very sophisticated attacks against hardware that require advanced engineering. But attacks don’t really have ...