Virus "BlueBorne Attack" Utilizes Bluetooth To Seize and Control Smartphones
Everyone we know, from friends to clients, homeowners to employees to business owners, has a smartphone. Many of them use their Bluetooth...
Establishing (Security) Boundaries with Geofencing Technology
We've heard of invisible fencing for dogs, but not many consumers have heard of geofencing, though it is a growing buzz-word in business...
Your Old Smartphone as a Secret-Agent!?
The truth is that very few DIY home security projects are effective, but if you need a quick set up in an area of your house or office...
The Vulnerabilities of Smart Tech
Experts call for uniform standards to reduce the vulnerabilities of smart technology. The Internet of Things has gone mainstream. Home...