Are Smart Homes Vulnerable to Malware?

The Smart home has become popular in recent times. With all this technology, however, are owners of smart homes are now faced with the probability of getting hacked, malware attacks, and intrusion of privacy by malicious people or government?

What a security expert thought of a few new smart-home devices at CES 2018

Rob Pegoraro for Yahoo Finance: To judge from the cornucopia of connected household devices on display at CES 2018, there is no product that manufacturers deem unworthy of being graced with a processor, a cloud service, and a companion app.

MIVATEK TO CREATE JAPAN'S FIRST ALL-WIFI CONNECTED PROTECTION SYSTEM

Sha Maison Development Will Become "Self-Monitored, Smart Community"; System Will Increase Security, Safety, & Health of Residents in 700-Unit Housing Community

Why Data-Centric Security Should be Priority for Mobile App Developers?

With a data-centric security strategy, the organization frees itself from the outdated protection systems making it easy to manage cyber threats. Thus, a mobile app development company can gain maximum benefit in the market based on the current scenario that prioritizes data

Securing Your Home Automation: Here's How to Avoid System Hacks

Hacking a home automation system is more common that we would like to think-and the results of a hack can severely affect your privacy and safety in the home. That's why keeping your systems safe is an essential part of owning home automation products.

Consumers are holding off on buying smart-home gadgets thanks to security and privacy fears

Caroline Cakebread for Business Insider: Consumers are uneasy about being watched, listened to, or tracked by devices they place in their homes, consulting firm Deloitte found in a new survey it released Wednesday.

LG IoT security bug highlights risks of home automation

Tech Central: LG's SmartThinQ is a framework for communication between devices that enables them to, among other things, be controlled by smartphone apps or by voice through integration with emerging smart home devices such as Amazon Alexa and Google Home.

Wi-Fi Devices Vulnerable to KRACK Attacks: Your 10-Point Cheatsheet

Gadgets 360: Vulnerabilities in WPA2, a protocol used by nearly all modern Wi-Fi devices, leaves all Wi-Fi devices at risk of being snooped upon, a security researcher revealed on Monday.

Life of Luxury or Potential Security Hack?: The Truth About Voice-Recognition Software in Your Home

You may not prevent every kind of threat, but even these cursory safeguards will do a lot to keep your data-and your private life-for intended audiences only.

A new wave of gadgets is setting out to secure your smart home

Rob Verger for Popular Science: Paul Lipman, the CEO of a British cybersecurity company Bullguard, points at those devices in our home, like smart locks or internet-connected televisions, as vulnerabilities because they can lack security features.

Security Implications of Permission Models in Smart-Home Application Frameworks

IEEE Software magazine via InfoQ: A key component of smart-home programming frameworks, such as Apple HomeKit, Samsung SmartThings, etc., is their permission model, which provides the first line of defense against remote attacks.

Could Better IoT Standards Reduce Cybercriminal Activity?

The challenge for developers will be in building complex security structures that don't hamper device usability.

Mandatory Security Implementation for All Z-Wave Certified IoT Devices

The Z-Wave Alliance, an open consortium of leading global companies deploying the Z-Wave smart home standard, as of today will require strict and uniform adoption of a new security protocol for all Z-Wave devices receiving certification. The Alliance Board of Directors voted unanimously in November 2016 to require mandatory implementation of the new Security 2 (S2) framework, the most advanced security for smart home devices and controllers, gateways and hubs in the market today.

New CTA Smart Home Security Checklist for Tech Installers Will Improve Consumers' IoT Security

"To better safeguard consumers' privacy and sensitive information, CTA created the first-ever tool designed by installers, for installers, that outlines existing best practices, standards and methods for today's smart home security challenges."

CIA Exploits of IoT Devices, What Lessons Can We Learn?

All too often, companies building connected devices either ignore security completely, try to bolt it on late in the development cycle, or treat it as a "nice to have" feature.

Records 1 to 15 of 32

Next | Last

Featured Product

REPLACEMENT INTERCOM SYSTEM WITH BUILT-IN MP3 DISTRIBUTION

REPLACEMENT INTERCOM SYSTEM WITH BUILT-IN MP3 DISTRIBUTION

RETRO-M is designed to replace existing Home Intercom Systems and operate on existing 3 and 4 wire systems. BLUETOOTH you music by adding the BT-RECEIVER. No need to remove existing master wall housing, trim plates available to cover those large holes. The RETRO-M intercom unit has a built-in AM/FM radio. Plug in mp3 players such as iPod, iPhone, Zune or any other hand held player into the master and share your music with the entire family. Choose between two music sources; listen to the radio in one room and the mp3 in another room.