Internet of Things


492 articles

How To, Internet of Things, Digital Security, Privacy

Gathering dust and data: How robotic vacuums can spy on you.

Gathering dust and data: How robotic vacuums can spy on you.

How To, Internet of Things, Digital Security, Privacy

Gathering dust and data: How robotic vacuums can spy on you.

Mitigate the risk of data leaks with a careful review of the product and the proper settings.

Roman Cuprik26 Jul 2023


Internet of Things

Hear no evil: Ultrasound attacks on voice assistants

Hear no evil: Ultrasound attacks on voice assistants

Internet of Things

Hear no evil: Ultrasound attacks on voice assistants

How your voice assistant could do the bidding of a hacker – without you ever hearing a thing

Márk Szabó07 Jun 2023


Internet of Things

Hacking baby monitors can be child’s play: Here’s how to stay safe

Hacking baby monitors can be child’s play: Here’s how to stay safe

Internet of Things

Hacking baby monitors can be child’s play: Here’s how to stay safe

Make sure that the device that’s supposed to help you keep tabs on your little one isn’t itself a privacy and security risk

Phil Muncaster07 Nov 2022


Internet of Things

8 questions to ask yourself before getting a home security camera

8 questions to ask yourself before getting a home security camera

Internet of Things

8 questions to ask yourself before getting a home security camera

As each new smart home device may pose a privacy and security risk, do you know what to look out for before inviting a security camera into your home?

Phil Muncaster03 Oct 2022


Kids Online, Internet of Things

Toys behaving badly: How parents can protect their family from IoT threats

Toys behaving badly: How parents can protect their family from IoT threats

Kids Online, Internet of Things

Toys behaving badly: How parents can protect their family from IoT threats

It pays to do some research before taking a leap into the world of internet-connected toys

Phil Muncaster08 Sep 2022


Malware

How Emotet is changing tactics in response to Microsoft’s tightening of Office macro security

How Emotet is changing tactics in response to Microsoft’s tightening of Office macro security

Malware

How Emotet is changing tactics in response to Microsoft’s tightening of Office macro security

Emotet malware is back with ferocious vigor, according to ESET telemetry in the first four months of 2022. Will it survive the ever-tightening controls on macro-enabled documents?

Rene Holt16 Jun 2022


Internet of Things, Privacy

Every breath you take, every move you make: Do fitness trackers pose privacy risks?

Every breath you take, every move you make: Do fitness trackers pose privacy risks?

Internet of Things, Privacy

Every breath you take, every move you make: Do fitness trackers pose privacy risks?

Should you beware of wearables? Here’s what you should know about the potential security and privacy risks of your smartwatch or fitness tracker.

Phil Muncaster26 Jan 2022


Malware

Virus Bulletin: Old malware never dies – it just gets more targeted

Virus Bulletin: Old malware never dies – it just gets more targeted

Malware

Virus Bulletin: Old malware never dies – it just gets more targeted

Putting a precision payload on top of more generic malware makes perfect sense for malware operators

Cameron Camp15 Oct 2021


Malware

FBI removes web shells from compromised Exchange servers

FBI removes web shells from compromised Exchange servers

Malware

FBI removes web shells from compromised Exchange servers

Authorities step in to thwart attacks leveraging the recently-disclosed Microsoft Exchange Server vulnerabilities

Amer Owaida14 Apr 2021