
Hole in the bowl: smart pet feeder springs a leak
Smart feeders were invented to make life easier for pet owners; however, their vulnerabilities threaten not only owners’ privacy, but also the health of their pets.
666 articles
Smart feeders were invented to make life easier for pet owners; however, their vulnerabilities threaten not only owners’ privacy, but also the health of their pets.
You can apply the concept of a threat landscape as used in corporate security to yourself to make it easier to stay protected.
The effectiveness of a sandbox largely depends on its ability to realistically imitate a working environment.
If you want your smart home to do more good than harm, you should configure it correctly and secure it adequately. We review smart-home security in detail.
Avast solutions have a pretty good reputation, but a handful of incidents call their safety into question. Read on to learn whether Avast can be trusted.
Hundreds of millions of dollars stolen: the five biggest heists in cryptocurrency history.
We explore the latest method for detecting hidden cameras and microphones described in one of the year’s best studies on personal security.
We explain what a smartphone’s ToF sensor is and how researchers from Singapore propose using it to find hidden cameras.
Just like many other modern devices, seemingly “dumb” feature phones are much smarter than you might think. And this may be a problem.
We explore the security settings of one of the most popular chat platforms on the planet.
Tips on security and productivity for those who work both from home and in an office.
How Zoom security is evolving, what threats are still current, and how developers plan to eliminate them.
Kaspersky Password Manager can do a lot more than just store your passwords.
ArtStation job scam targets freelance artists.
What to do if you receive a notification about a suspicious login to your Facebook or Instagram account.
Seemingly overnight, the pandemic changed the way we work, and infosec departments are still adjusting. What’s on the horizon for employees in the coming year?
We explain why secret chats in Telegram are a must, and how to configure security and privacy.
What do trading platform developers and operators need to keep in mind?