Huawei responds to Android ban with service and security guarantees, but its future is unclear
Huawei has finally gone on the record about a ban on its use of Android, but the company’s long-term strategy on mobile still remains unclear.
Huawei has finally gone on the record about a ban on its use of Android, but the company’s long-term strategy on mobile still remains unclear.
We’ve mostly moved past the point where our Internet of Things devices leak private information to anyone watching via unsecured connections, but that doesn’t mean you can stop being afraid. Never, ever stop being afraid. To
Internet providers could easily snoop on your smart home Continue »
As 3D printers grow smarter and continue to embed themselves in manufacturing and product creation processes, they are exposed to online malefactors just like every other device and network. Security researchers suggest a way to prevent
Protecting 3D printers from cyberattacks could be as simple as listening carefully Continue »
DJI is working on a “local data mode” for its apps that prevents any data from being sent to or received from the internet. The feature will be welcomed by many, but it’s hard not to
DJI adds an offline mode to its drones for clients with ‘sensitive operations’ Continue »
The U.S. has now lifted entirely a controversial ban on laptops in hand luggage for passengers flying to the country from the Middle East or via certain Middle Eastern airlines, with the Department of Homeland Security
US lifts laptop ban for all remaining airlines and airports Continue »
I recently sat down with Logitech to talk about the wired and wireless versions of the Circle 2: a modular home surveillance camera with four different mounts that change where and how you’d use the camera.
Logitech’s Circle 2 is a modular home surveillance tool with Alexa and HomeKit support Continue »
When it comes to home surveillance cams there are two kinds of cams – low-end, highly-motorized, wireless IP cams that are (typically) fairly insecure and higher-end cloud service systems like Dropcam that offer secure but more
SpotCam connects you to your home, outside and in Continue »
Biometrics may not be the perfect solution for security, but they can be useful — as long as they’re robust and well thought out. TouchID is all well and good, but you wouldn’t secure a nuclear
Swiss system ups security and reliability of finger-based biometrics Continue »
Devices that compile, analyze and store electronic information are everywhere. Known as the Internet of Things, the number of devices connected to the internet is already double the number of humans on earth. Electronically stored info
Lost and stolen iOS devices could be at risk if ne’er-do-wells learn of this blunt-force method of getting past Activation Lock. No special equipment or technical know-how is required, which means any geek off the streets
Copy and paste trick could unlock iOS 10 devices in Lost Mode Continue »