Smart Home Goes Scandi As IKEA Rolls Out a Smart Home Lineup
Ah, IKEA. The furniture store probably best known for simple furnishings with not-so-simple assembly instructions (and simply delicious Swedish meatballs)...
These Cute Teddy Bears Have Been Recording Your Kids
When we think of cyberhacks, we often think of criminals trying to break into a network of important information protected...
A Reflection on Mobile World Congress
This blog post was written by Nick Viney. As the dust settles on another busy year at Mobile World Congress,...
MWC 2017: What We Learned About the Mobile Landscape
MWC (Mobile World Congress) has come and gone yet again, and over the course of the four-day conference we’ve seen...
Thoughts from the conference floor: securing the connected home
This blog post was written by Nick Viney. In my line of work, you read and hear a lot about...
7 Ways to Boost the Love and Balance the Tech in Your Family
What if the most valuable gift you could give your sweetheart — or your family — cost you absolutely nothing?...
How ‘Switcher’ Malware Moves an Attack from Your Phone to Your Router
Why attack one device when you can get inside an entire network and manipulate every device connected to it? That’s...
Why You Should Update or Lose Your Mobile Apps
This blog was written by Bruce Snell. If you’re like me, you probably have at least a dozen apps on...
Mobile Messaging And Kids: How Aware Are Parents?
Messaging apps are the in thing today. Right from a collegian to the 40-something mother of two; from the local...
The iPhone’s Biggest Weakness May Be Your Computer
Mobile malware is the fastest growing security threat we face today. But that threat has long been lopsided, and unfortunately,...