For Airbnb hosts who want to keep tabs on their homes, a full home security system might be overkill. They're expensive, and live cameras and motion detectors invade guests' privacy. So how do they make sure guests keep the volume down, aren't smoking inside and don't ransack their home?
A new device called Point combines microphones with environmental sensors to detect anything out of the ordinary in your home while you are away. A broken window while you're at work, the sound of your teenagers throwing a raging party, Grandad sneaking an unauthorized after-dinner cigar.
Government officials in the U.S. and the UK are warning people to secure their webcams after websites that broadcast the contents of those cameras have sprung up online.
One of the better-known sites, Insecam, appeared to have gone offline after the warnings Thursday, but at least one site that publishes similar content was still available.
A federal court in Washington has rejected a $30,000 damages award against several Internet subscribers accused of downloading a pirated movie via BitTorrent. Judge Thomas Rice doubted that filmmakers were hurt much by the pirates and said the requested amount would be "excessive punishment."
Over the past several years hundreds of thousands of Internet subscribers have been sued in the United States for allegedly sharing copyrighted material, mostly films, online.
The king of the castle has a new tormentor.
IBM’s Trusteer researchers have discovered a new configuration of the Citadel malware that attacks certain password managers. The configuration activates key logging when certain processes are running on the infected machine. The targeted processes include Password Safe and KeePass, two open-source password managers. The variant also targets the nexus Personal Security Client used to secure financial transactions and other services that require heightened security.
When it comes to securing your Wi-Fi network, we always recommend WPA2-PSK encryption. It’s the only really effective way to restrict access to your home Wi-Fi network. But WPA2 encryption can be cracked, too — here’s how.
As usual, this isn’t a guide to cracking someone’s WPA2 encryption. It’s an explanation of how your encryption could be cracked and what you can do to better protect yourself.
Researchers have unearthed highly advanced malware they believe was developed by a wealthy nation-state to spy on a wide range of international targets in diverse industries, including hospitality, energy, airline, and research.
China may have the ability to remotely shut down computer systems of US power utilities, aviation networks and financial companies, according to director of the US National Security Agency Mike Rogers.
Testifying to the House of Representatives Intelligence Committee on cyber threats, Rogers said digital attackers have been able to penetrate such systems and perform "reconnaissance" missions to determine how the networks are put together.
Symantec Security Response has discovered a new malware called Regin which, they say, "...displays a degree of technical competence rarely seen and has been used in spying operations against governments, infrastructure operators, businesses, researchers, and private individuals."
This back-door trojan has been in use, according to the security company, since at least 2008, and has stayed under the radar since.
While Google and Microsoft are using large amounts of free cloud storage to sell inexpensive consumer notebooks, Apple has stood above the fray. But there's no reason Apple can't join in.
On Friday, Google announced that all Chromebooks purchased through Dec. 31 will be eligible for a free one-terabyte allowance to Google Drive for two years.
Since 2004, Google has been paying Mozilla a ton of money each year—estimated at around $100 million—for the privilege of being the default search engine used in the Firefox browser. This contribution represented the lion's share of Mozilla's income, something in the ballpark of 85 percent.