There will always be nefarious individuals looking to do harm. This is the backbone of a lawsuit against two companies looking to scam Amazon Alexa users.
Researchers have discovered a new way for hackers to get their hands on your data. As it turns out, IoT isn’t storing biometric data as well as we might have hoped.
Unfortunately, ESET IoT Research has recently found that three home hubs have severe security flaws. As such, owners should consider updating or replacing them.
Sure, 5G is super fast and utilizes low latency, but there are other things to consider beyond that, such as the increased chance of security attacks to IoT.
IoT is riddled with security issues. Teserakt is looking at a new open-source method to encrypt IoT data to improve at least some common security problems.
When lives matter, smart medical devices can’t afford major security flaws. Discover the latest flaws and what’s being done to fix them.
Amazon started implementing a 2FA system for all their Ring users. This should help stop hackers from getting an easy foothold on someone’s network.
A recent report shows that a majority of security professionals are confident in their product security, but can’t prove that they are safe enough. This is indeed worrying.
The more IoT devices you add to your network, the more avenue you open up for hackers to attack you. It’s best to segregate your network for IoT devices.
A recent report has discovered a nasty exploit within Philips Hue which shows that even light bulbs are a nasty threat in the IoT world.
IoT has a rough history with security. This has prompted countries to implement stricter IoT laws to improve the security of the devices.
The Amazon Ring Doorbell’s security issues have gotten so bad that even an Amazon employee is calling for the Ring Doorbell to be shut down.
A list of 500,000 IoT credentials made their way onto the Internet. The list was posted on a hacker forum for anyone to see and use.
Today’s children are the first of their generation to be born during the IoT revolution. Here are a few tips to help keep children safe in the IoT era.
Kali Linux can be used to perform a variety of penetration tests on your PC. Here are some penetration testing strategies for IoT devices with Kali Linux.
A recent spike of Ring camera hacks has shown the darker side of entrusting home security to IoT. Here is what happened and what you should know.
Many smart devices don’t come with a password, yet security advice calls for you to change the password on IoT devices. What does this really mean?
The FBI has recently released a warning that smart-home networks should be on a separate network than the primary home network. That way, hackers can’t access your personal data.