How Does Cybersecurity Impact Environmental Services and Infrastructure?

Environmental sustainability has become a significant concern for businesses today. Yet, many are not seeing the connection between sustainability efforts and cybersecurity.  Despite how different they may seem, these two topics are ...

Threats to Smart Home Security and How to Counter Them

Smart home systems are revolutionizing entertainment and convenience. They also contain loads of personal information that make them popular targets for cybercriminals. However, those who understand smart home security threats and the ...

Voice-Activated Device Privacy: What You Need to Know

When it comes to evaluating technology in the home, there seems to be no shortage of new devices and shiny gadgets, mainly part of the Internet of Things (IoT), to discuss. Unfortunately, ...
connected cars

Connected Cars, Smart Homes Remain Targets 

The European Union Agency for Cybersecurity (ENISA) released a smart car safety report detailing how connected cars expand the potential of cyberattacks. Several years ago, IOActive researchers (among others) proved that it’s ...
Security Boulevard
Home Security Vendor Sued After Technician Spied on Customers in ‘Intimate Moments’

Home Security Vendor Sued After Technician Spied on Customers in ‘Intimate Moments’

Users of ADT home security systems have filed a class action against the vendor after discovering that a technician used his own credentials to set up the hardware and then spied on ...
3 Home Security Tips and Guidelines You Never Thought Of

3 Home Security Tips and Guidelines You Never Thought Of

Your home is meant to be a safe place where you and your family can live happily and healthily. An intrusion can steal away that feeling of safety and have a lasting ...

Hushmesh: Finally Someone Has Figured Out How To Eliminate Passwords

When I joined IBM back in the 1980s, one of the big problems we were dealing with was IDs and passwords, which we listed as the most vulnerable parts of any computer ...
Sharks With Frickin Laser Beams ::: Dr. Evil ::: Austin Powers

Facebook Data Leaks, Smart Speaker Laser Attack, BlueKeep in the Wild

You’re listening to the Shared Security Podcast, exploring the trust you put in people, apps, and technology…with your host, Tom Eston. In episode 94 for November 11th 2019: Facebook’s Group API data ...
Akamai IoT devices cybersecurity internet of things IoT security

IoT Complexity Creating New Hacker Opportunities

The internet of things (IoT) is not a glimpse into a high-tech future. It’s already here, changing the way we live and work forever. Gartner predicts that more than 14 billion connected ...
Security Boulevard

The Risk of Credential Stuffing to the Smart Home

As technology advances and the costs of connecting electronic components to the internet decreases, the lower the cost of having an internet connected smart home is. Sensors placed throughout a house and ...