It’s Time to Treat Your Home Security Cameras as Compromised
At the end of March, Bitdefender, a leading cybersecurity research firm, published a damning report about Wyze, one of the leading security brands on the market. The charge: That the…
The Internet of Things is the expansion of networked computing to everyday devices.
At the end of March, Bitdefender, a leading cybersecurity research firm, published a damning report about Wyze, one of the leading security brands on the market. The charge: That the…
Its been 20 years since "The Wire" and it still seems like everyone thinks Burner Phones are for Drug Dealers. But a Burner Phone is really just a private, anonymous…
Here’s a fun thought experiment; picture the amount of personal data you think tech companies keep on you. Now, realize it’s actually way more than that (hmm, maybe this isn’t…
Researchers at the University of Darmstadt, Brescia, CNIT, and the Secure Mobile Networking Lab, have published a paper that proves it's possible to extract passwords and manipulate traffic on a…
ThreatFabric’s report only mentions a few of the malicious apps, but they include QR scanners, PDF scanners, fitness trackers, and crypto apps. Unlike other fake apps that falsely advertise their…
If your Internet Providers cannot tell where your traffic is going, what it is accessing, and where it originated then it is going to be very difficult for them to be anything other than neutral. Read on to find out how this is possible and how you can make it happen today.
Security researchers are sounding the alarm on a critical vulnerability affecting tens of millions of devices worldwide connected via ThroughTek’s Kalay IoT cloud platform. The security issue impacts products from…
Android 12 adds killswitches for both the mic and camera. This new feature makes it possible for users to shut off access to hardware that could potentially lead to privacy…
Security vulnerabilities in millions of Internet of Things devices could allow cyber criminals to knock devices offline or take control of them remotely, in attacks that could be exploited to…
Imagine a child born this year who will be surrounded by technology at every phase of her childhood. When she is three years old, Sophie’s parents buy her a smart…