Has Eufy Stepped Up Their Privacy Game?
Eufy Security had quite the upset at the start of 2023 with serious security flaws in the ‘private’ cameras. How are they doing now?
Why You Really Should Use A Password Manager
We all use lots of online services that need passwords. How can we manage them safely?
How strong does your Wi-Fi password need to be?
Ubiquitous WiFi access in our homes means less and less reliance on wired connectivity. It's imperative that we keep uninvited guests off our network while we're beaming it into the air. What is really needed to be secure, without being burdensome?
Is your smart home vulnerable to lasers?
Did you know your smart devices can be hacked by lasers? This trick uses light to implant voice commands into smart speakers. Find out what this means for you.
Can you delete your Alexa voice recordings? Sort of.
Smart speakers add a lot of utility to the smart home, but there are always privacy considerations when you have an internet connected microphone in your home. What controls does Amazon provide?
Smart devices, Machine learning, and why you should care
Smart devices are increasingly using big data and machine learning to help us get the results we expect from their use. But without an understanding of how they work, are we exposing our personal lives to faceless reviewers? How does this technology work, and what does it mean for our smart homes?
People really don’t get home router security, who knew?
A UK based survey of home router owners provides an eye-watering view of general user ignorance and lack of awareness of basic security requirements.
FingBox network security appliance: Review
The FingBox, a handy little network security gadget and troubleshooting toolkit for the home. If you've ever wondered how to keep an eye on your network, this new crowdsourced appliance may be of interest.
Fing network scanner app: Review
Fing is billed as a 'super-fast network scanner', and that's pretty much what it does, at least originally. Fing itself offers network scanning of the local subnet, device port scanning, and connectivity testing to local or remote addresses.
Does physical device access = game over?
According to a group of hackers speaking at this years Black Hat conference most manufacturers assume that once a bad guy has physical access to the device, all is lost. That's not going to end well.
Network Security for Connected Devices
Different usage scenarios present different challenges for configuring a secure home network. Here we look at the likely types of configurations in play and what we can do to help protect our home network.