Philips Hue LED bulbs and other smart home devices that incorporate ZigBee wireless standards are vulnerable to hacking, according to recent findings by IT firm Cognosec. At a Black Hat USA conference in Las Vegas recently Cognosec senior ...
Tags: Security Flaws, ZigBee devices, LED bulbs
The conference program for Label Summit Latin America 2014 is now available as registration opens for its 11th edition. The continent’s largest dedicated event, Label Summit Latin America has led the way in professional and commercial ...
Tags: Retailer Surya, Flagship, industry trends
More fixes are appearing for a pair of highly dangerous vulnerabilities exposed earlier this month in the Android mobile operating system. Security vendor Webroot and ReKey, a collaboration between Northeastern University in Boston and ...
Tags: Computer Products, software
Why to Choose Tricycles are typically used by children between the ages of two and four, after which point they usually switch to a bicycle, often with training wheels. Parents choosing a tricycle for their child should ensure ...
Tags: Ride on Toys, children's tricycles
ADT is introducing its latest feature for its home automation solution ADT Pulse? – remote door locks, putting a "master key" at consumers' fingertips. ADT Pulse users will now be able to lock or unlock any door in their home using ...
Tags: ADT, Consumer Electronics, master key, Electrical, Electronics
Composite doors may be synonymous to security personified. Composite doors are known to have garnered its identity from the very fact of the consistency of materials used to fabricate the door. They function as the virtual security guards ...
Tags: Composite Door
Representatives of newly launched file-storage and sharing service Mega addressed some of the concerns raised by security researchers in recent days about the site's architecture and the implementation of its cryptographic features. In a ...
Tags: file-storage, sharing service, Mega
IDG News Service - A new tool allows Mac OS X attackers with root OS access to easily steal the keychain password data of logged in users and reinforces the dangers of granting administrative privileges to applications without serious ...
Tags: OS X, software, keychain, keychaindump
A new tool allows Mac OS X attackers with root OS access to easily steal the keychain password data of logged in users and reinforces the dangers of granting administrative privileges to applications without serious consideration. The ...
Tags: Apple, hackers, Keychain data, Mac OS X