“IoT” is an acronym for the “Internet of Things.” And any device that can connect to the Internet and transmit or receive data can be considered a “smart” thing. That includes smart homes, also known as connected homes. Smart homes — in which IoT devices such as thermostats or ovens can be programmed from anywhere — are popular with consumers who seek convenience. Some people, however, may not realize the connected devices or appliances they’ve grown to depend on could leak private information or be susceptible to hackers. In the rush to get products to market, smart device makers may not see security as a priority.
While any time is a good time to adopt new habits, the New Year seems to be the most popular time for resolutions. When most people are resolving to make changes to their lifestyle, health, and habits, a lot of people do not realize that they should consider making resolutions to their digital lifestyle as well. Here are some suggested resolutions to living a healthy and secure online life.
Software Updates- Install Early, Install Often
Software vulnerabilities are security holes discovered and exploited by hackers that allow them to access your computer. The attacks are carried out by...
Falling for an email scam is something that can happen to anyone. It’s a frightening concept, and one that frequently results in undiluted panic. Also known as a phishing scam, an email scam involves using email and fraudulent websites to steal sensitive information such as passwords, credit card numbers, account data, addresses, and more.
Fraudulent emails are crafted to appear legitimate, such as messages from your bank or another trusted source. They request personal information, which criminals then use for identity theft.
So what should you do if you find yourself a victim of an e...
Have you heard of something called cyber hygiene? Surely brushing teeth and taking showers isn’t something we traditionally associate with technology—yet the term is a useful metaphor for those of us who need to make smart decisions about our smart devices.
Good hygiene is something we’re taught as children and something that generally sticks with us for the rest of our lives. It involves three basic principles: using products/tools that fit our hygiene needs, performing these hygienic tasks correctly, and establishing a routine.
But what does that have to do with your computer?
Thanksgiving not only marks the start of the fantastic holiday season—it’s also a time to reflect on what you’re thankful for. One of the many things to be thankful for this holiday is cybersecurity, which has gotten more and more advanced as of late.
Did you know that an attacker can flood your house via the water dispenser on your connected refrigerator? Or that bluetooth enabled locks can be picked from ¼ of a mile away using radio frequencies? I didn’t either, until I attended this year’s DefCon 24, an annual hacking convention in Las Vegas.
While a hotel in Las Vegas full of 22,000 hackers sounds like it might not be a good idea, it’s just the opposite. The purpose of this conference is to bring together Internet security professionals from all over the world to help educate, inform and learn how to make the Internet a safer place...
Mobile payment apps are changing the way we do business, but they can also be convenient ways to send money to friends and family. It’s easier than ever to send money to the people who need it, but also easier than ever for hackers to gain access to that money before it gets where you want it. How do you keep yourself and your money safe, while also being able to access the convenience of mobile payment apps?
How Mobile Payment Apps Work
You can pay using your phone, even without apps. Some companies, such as your phone company, allow you to pay your bill using standard text messaging....