The Future of Home Security

Spread the love

Spread the loveTweetThe world of technology has taken a toll to dominate various characteristics of our lives including the security of our home. With the rising amount of crimes and…


Spread the love

Man arrested after knocking over a 300-pound security robot

Spread the love

Spread the loveTweet Police say Jason Sylvain knocked down the Knightscope droid while it was patrolling the parking lot, last week. The man faces prowling and public intoxication charges, but…


Spread the love

Russian hackers use OAuth, fake Google apps to phish users

Spread the love

Spread the loveTweetThe Russian hacking group blamed for targeting U.S. and European elections has been breaking into email accounts, not only by tricking victims into giving up passwords, but by…


Spread the love

Nastier version of IoT botnet could brick your smart toaster

Spread the love

Spread the loveTweet The IoT devices used in this most recent denial-of-service attach are the same type as those targeted by Mirai, the botnet software that shut down most of…


Spread the love

How to Secure Your Online Accounts By Revoking Access From Third-Party Apps

Spread the love

Spread the loveTweet A lot of web apps these days request access to another account. Sometimes that’s because they’re adding something to that service, other times it’s simply because of…


Spread the love

Just a Pair of These $11 Radio Gadgets Can Steal a Car

Spread the love

Spread the loveTweet For years, automakers and hackers have known about a clever attack that spoofs the signal from a wireless car key fob to open a vehicle’s doors, and…


Spread the love

How to Stop Services Like Unroll.me From Snooping on Your Gmail

Spread the love

Spread the loveTweet The pitch has plenty of appeal: Sign up for our service, and we’ll automatically unsubscribe you from all those pesky email lists. For free! Except, not quite;…


Spread the love

Uber Didn’t Track Users Who Deleted the App, But It Still Broke the Rules

Spread the love

Spread the loveTweet Once again Uber finds itself taking heat for questionable business practices. This time the company was using software to identify iPhones even after their owners deleted the…


Spread the love

Ransomware Is Being Hidden Inside Attachments of Attachments

Spread the love

Spread the loveTweet The new ransomware campaign, highlighted by the Naked Security blog, works like this: Advertisement Advertisement You’re sent a spam email with a PDF attachment (which should already…


Spread the love

Unroll.me, the Email Unsubscription Service, Has Been Collecting and Selling Your Data

Spread the love

Spread the loveTweetYesterday, The New York Times went deep into some of Uber’s shady business practices. In the article, one small section revealed that one service we’ve talked about extensively…


Spread the love