Security

Home security company ADT had an offer its website users couldn’t refuse: never criticize the company or its products. Customers accessing the “My ADT” service were challenged to agree to new terms and conditions, among which was “Will not disparage ADT, ADT’s products or services, or any of ADT’s affiliates…

Read More

Conducting a meeting in your conference hall, in earlier days, was considered as a hectic task. Arranging everything and turning the meeting into something fruitful, without using technology, was difficult. Almost every office has a conference hall where they can conduct their meetings. In the current scenario, technological advancements have…

Read More

When Context Labs teamed up with UK consumer group Which? to produce an outstanding report on the surveillance, privacy and security risks of kids’ “connected toys,” it undertook the reverse-engineering of Hasbro’s new Furby Connect, a device that works with a mobile app to listen and watch the people…

Read More

Science fiction technology may not be as far off as we believe. The Internet of Things (IoT) uses the powerful combination of Wi-Fi and cloud technology to send information and perform actions through devices with Internet capabilities. This advance stems from the use of telemetry, decades-old machine-to-machine communication via wired…

Read More

As you read through blogs and articles about cybersecurity and the Industrial Internet of Things (IIoT), it’s easy to get so focused on the complexities (and there are many), that you lose sight of the big picture. There is huge opportunity in this space—untapped by the existing IT cybersecurity players….

Read More

That’s according to this month’s shareholder filings; the company estimates the total bill at $166 million more, plus class action damages. Equifax’s nation-destroying data-breach was subsequently revealed to be just the latest in a series of unbelievably careless IT blunders, and it eventually cost the company CEO his…

Read More

In March, Wikileaks published the Vault 7 leaks, a cache of CIA cyberweapons created under the doctrine of “NOBUS” (“No One But Us”), in which security agencies suppress the publication of bugs in widely used software, choosing instead to develop attack-tools that exploit these bugs, on the assumption that…

Read More

The emergence of IoT has led to work smarter and revolutionizing the way employees work and interact with others. Workplaces are getting smarter; employees are being more productive and potential for smart workplace scheduling is evolving. According to a recent survey by Cisco, deployment of IoT is stalled 60% of…

Read More

The WannaCry ransomware attack from this May made the whole world think about cyber security issues once again. Another unique point for WannaCry versus previous cyber attacks is IoT also got involved with the crisis as well. We learned from the news reports that this worm virus was different from usual. It…

Read More