
The hidden risks of cheap Android devices
Buying a cheap Android device can be an expensive mistake if it fails to perform its primary function or happens to be infected with viruses right out of the box.
92 articles
Buying a cheap Android device can be an expensive mistake if it fails to perform its primary function or happens to be infected with viruses right out of the box.
Even if you don’t know it, you probably have devices running Linux at home — and they need protection too! Here are three Linux threats that even IT professionals often forget about.
What settings do you need to clear before getting rid of a gadget?
Smart feeders were invented to make life easier for pet owners; however, their vulnerabilities threaten not only owners’ privacy, but also the health of their pets.
Why such OSs are gaining more significance in markets in need of security.
Better put them on something not very valuable or necessary. Here we explain why.
If you want your smart home to do more good than harm, you should configure it correctly and secure it adequately. We review smart-home security in detail.
Chances are your home already contains a few smart components. But can you make them even smarter so as to reap yet more benefits from them?
How to make sure a robot doesn’t spy on you, and can it function without internet access?
Home video surveillance systems are said to be safe. But are you ready to become a reality TV star without realizing it?
Every year, the number of tasks we entrust to machines rises steadily. How safe is this?
Cyber immune gateway that can shield IoT and IIoT devices from cyberthreats.
After conducting a thorough study of applications for connected cars, our experts highlighted a number of flaws of such software.
Most third-party apps for connected cars require access to your account with the manufacturer. But are they secure?
Smart devices are easy targets for cybercriminals. Here’s how to protect your smart vacuum cleaner, air conditioner and other connected devices.
Some network-attached storage from WD has been reset to factory settings, wiping users’ data. Here’s how to protect your WD NAS.
IoT devices tend to greatly increase a company’s attack surface, but you can minimize the risk.
At RSA Conference 2021, researchers talked about how they managed to turn a Comcast Xfinity remote into a listening device.
Jeff and Dave discuss the death of Adobe Flash, swatting through the Internet of Things, and more.
Most people may see the COVID-19 pandemic as a medical battle, but it is also very much a cyber-battle.
This National Cybersecurity Awareness Month, we’re prioritizing IoT security