- Welcome Guest
- Sign In
Samsung held its annual Unpacked event in San Francisco's Bill Graham Civic Auditorium on Wednesday, presenting fans with a new product lineup that includes three versions of its flagship Galaxy S10, plus the Galaxy S10 5G, the Galaxy Fold, and several new wearables. It had been widely rumored well ...
Amazon has scooped up mesh WiFi network maker Eero, the home network company known for making an easy-to-set-up product that can blanket a home with high-quality WiFi. "We are incredibly impressed with the Eero team and how quickly they invented a WiFi solution that makes connected devices just work...
AT&T, T-Mobile and Sprint have sold access to subscribers' real-time location data to aggregators, which in turn have sold it to about 250 bounty hunters and related businesses, according to a report. In some cases, the data allowed users to track individuals to their specific locations inside a...
We are approaching critical mass on a number of technologies that we will see increasingly this year. This wave will start at CES, where we will see an impressive number of attempts at personal robots and AI-powered digital assistants. Most will fail. However, both the failures and the few successes...
Why would Apple want to put Qualcomm out of business? It's because Apple uses a lock-in strategy, where once on an Apple platform it is painful to get off. Most of the smart Apple iPhone users I know actually use Google apps and Google's infrastructure and other third-party tools on their iPhones, ...
Do you take your online privacy seriously? Most people don't. They have an ideal scenario of just how private their online activities should be, but they rarely do anything to actually achieve it. The problem is that bad actors know and rely on this fact, and that's why there's been a steady rise in...
I just finished The Fourth Age: Smart Robots, Conscious Computers, and the Future of Humanity, and it was one hell of a read. A lot of us are concerned about the coming of robots that arguably will be more capable than we are. This book likely will make some feel a tad more comfortable about the fut...
Network devices with better security will be hitting the market this year, thanks to Wi-Fi Certified WPA3, which the Wi-Fi Alliance launched Tuesday. The announcement paves the way for the proliferation of devices that support the new, more secure protocol for WiFi communication, which is designed t...
Smart homes are here. Although not every home in the U.S. is tricked out with the latest technologies, they're no longer a rarity. For example, a hefty 41 percent of the people who responded to an online survey conducted last year said they already owned smart home devices. Sales of smart refrigerat...
If there ever were a time when perception Trumped reality, this would be it. So much of what we see these days that looks real just isn't. I can connect a lot of this back to Steve Jobs, who was the master at this in the tech world. However, I'm worried that too many people don't realize that there...
Most WiFi router vendors have not patched numerous firmware vulnerabilities discovered more than two years ago, according to a report released Tuesday. OEM firmware built into WiFi routers use open source components that contain numerous known security vulnerabilities that can be exploited by hacker...
A bug in the software used by Google Cast devices such as Chromecast and Home can slow down or crash WiFi networks. The problem -- initially believed to be isolated to a particular router model made by TP-Link -- appears to affect models made by other manufacturers, including Asus, Linksys, Netgear ...
The 5G standards target billions of new devices that will connect to operators' networks over the next decade and beyond. Each device type serves a use case that can be high-volume with low throughput requirements, or low-volume but high-value from a customer's point of view. The list of use cases k...
Billions of voice-activated Internet of Things devices may be subject to external attack due to BlueBorne vulnerabilities, Armis revealed on Wednesday. Hackers could exploit BlueBorne to mount an airborne attack, using Bluetooth to spread malware and access critical data, including sensitive persona...