- Welcome Guest
- Sign In
Smart home technology is quickly becoming more mainstream than niche. As people monitor and control so many aspects of their lives through apps and smart devices, they expect to do the same with their place of residence. TechNewsWorld spoke with experts in the field of domotics -- or information tec...
Imagine finding out that your neighbor's identity was stolen and their life savings cleaned out by criminals who entered through their 'smart' washing machine. Ridiculous, you say? Well, have you checked your home Wi-Fi network lately? You might have several connected household gadgets and other dev...
Even as operations as diverse as factories and hospitals are moving at least portions of their daily computational processes out of the centralized cloud and into various edges, edge computing for many people remains a mysterious concept. To provide some clarity and insight, we spoke with several ex...
After a successful rollout in the U.S. earlier this year, Amazon is expanding support for end-to-end encryption for video captured on its Ring products. Part of what's motivating this is probably setting a higher global standard so wherever Amazon goes, they will be welcome by satisfying stringent l...
Thousands of hacker attacks were launched on a network of smart home devices designed by researchers to assess the risk the gadgets pose to consumers. During the initial week the "honeypot" network was online, 1,017 unique scans or hacking attempts were directed at the devices on the net, which incl...
Advancements in 5G connectivity and accelerated digital transformation of business operations creates heightened risk and expanded attack surfaces for security teams to harden and protect. Now, efforts by several internet industry groups are focused on new measures to fix inherent security weaknesse...
A set of flaws in a widely used network communication protocol that could affect millions of devices has been discovered by security researchers. The nine vulnerabilities dramatically increase the attack surface of at least 100 million Internet of Things devices, exposing them to potential attacks t...
Last week was particularly interesting. Microsoft had two big announcements with Mesh and Viva, while Huawei showcased a strategy for a universal OS that covers PCs, smartphones, tablets, TVs, and IoT devices to perfect integration across them all. Let's talk about both this week -- and work in Micr...
Canonical on Feb. 2 made available Ubuntu Core 20. This new Ubuntu Core version boasts notable new device security innovations. Given the increasing numbers and sophistication of attacks by individual and state-sponsored cybercriminals, Canonical's efforts should be welcomed by both IoT device maker...
While it was already underway prior to the pandemic, the worldwide shift to digital payments has been accelerated by the crisis. This new cashless concept and the related back-end changes by banks to adopt real-time payments are becoming increasingly popular; and have set into motion the potential f...
Smart devices, the cornerstone of the home of the future, can't seem to capture the imagination or open the wallets of a large number of Americans. Some 46.7 million broadband households aren't ready to buy a smart home device, according to a survey released this week by Parks Associates, a market r...
The use of smart and connected devices promises to make our lives easier, but it might also give their manufacturers greater control over our lives. Some companies offering smart devices, including Google, Belkin, and Best Buy have killed off their smart device product lines without warning, leaving...
The demand for smart home devices is projected to grow steadily over the next few years. Nonetheless, consumers should think carefully before making a purchase due to a trend of manufacturers phasing out "smart" products. While it does not look good when a smart device maker abandons a product line,...
Surely spurred by the work-from-home necessities of 2020, people have connected a multitude of non-business devices to their corporate networks, making it progressively difficult to implement cybersecurity because every device is a potential weak point. So, who will ultimately be responsible for cyb...