Tagged With secutity

0

Almost every significant data breach starts by compromising an end-point device. And the easiest way to do that is to steal some user credentials. It's why the theft of credentials from Yahoo!, Ashley Madison and other large companies are such a big deal. Many people use the same usernames and passwords on multiple sites. But what if your access to a site was governed by something other than a username and password? This is where the YubiKey fits in.

0

A security researcher has discovered a new flaw in Google's Chromecast media streamer and google Home smart speaker that allows bad guys to connected gadgets to uniquely identify and, potentially, reveal precise physical locations. Using a technique called "DNS Binding", the researcher was able to use a simple script running in the background of a website to collect data about a network and then use Google's geolocation services to find where the device was based on local wireless networks.

3

There are literally hundreds of security cameras on the market. If you've been looking at cameras for a while, you'll be familiar with Swann. They've been making home security gear for a long time. The Swann Smart Security Camera is a security camera that can be used indoors and outdoors and boasts wireless operation. Here's what I found after a couple of weeks of testing.