#remote-lock

[ follow ]
#smart-home
fromZDNET
11 hours ago
Public health

How my smart home became my best defense against brutal spring allergies - and pollen

fromZDNET
11 hours ago
Public health

How my smart home became my best defense against brutal spring allergies - and pollen

Gadgets
fromZDNET
12 hours ago

I added a MagSafe charger to my nightstand and realized its untapped potential: 3 ways it's useful

MagSafe wireless chargers reduce cord clutter and optimize charging for multiple devices.
#cybersecurity
Information security
fromZDNET
4 days ago

Your router may be vulnerable to Russian hackers, FBI warns: 5 steps to take now

FBI and NSA warn of Russian hackers targeting vulnerable routers, urging users to update firmware and strengthen passwords.
Information security
fromTechSpot
5 days ago

Hackers are turning home routers into tools to spy on Microsoft 365 users

Forest Blizzard hackers exploit insecure routers to compromise devices and intercept traffic, targeting Microsoft 365 domains for sensitive data.
Information security
fromThe Hacker News
1 day ago

Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

A critical zero-day vulnerability in Adobe Acrobat Reader is actively exploited, alongside state-sponsored cyber threats targeting U.S. infrastructure.
Privacy technologies
fromYahoo Tech
4 days ago

Hackers Are Using Your Home Router to Spy on Microsoft 365 Users

Russian spies exploited consumer routers to steal Microsoft 365 credentials from thousands of users, turning home devices into espionage tools.
Silicon Valley
fromWIRED
1 day ago

The Dumbest Hack of the Year Exposed a Very Real Problem

A cyberattack in Silicon Valley exploited weak passwords to spoof crosswalk button recordings with voices of tech CEOs, raising security concerns.
Information security
fromZDNET
4 days ago

Your router may be vulnerable to Russian hackers, FBI warns: 5 steps to take now

FBI and NSA warn of Russian hackers targeting vulnerable routers, urging users to update firmware and strengthen passwords.
Information security
fromTechSpot
5 days ago

Hackers are turning home routers into tools to spy on Microsoft 365 users

Forest Blizzard hackers exploit insecure routers to compromise devices and intercept traffic, targeting Microsoft 365 domains for sensitive data.
fromTheregister
2 days ago

Apple update turns Czech mate for locked-out iPhone user

"The phone's very cracked, so, at this point, the photos contained in it are more valuable than the ability to use the phone itself. They're the main data that I care about and haven't backed up."
Apple
New York City
fromInsideHook
2 days ago

Can Self-Driving Cars Help Fix the Nation's Potholes?

Pothole repairs are gaining attention, with NYC filling 100,000 potholes and Waymo partnering with Waze to identify potholes using autonomous vehicles.
Privacy professionals
fromFast Company
3 days ago

This iPhone trick lets you use ChatGPT without the privacy risks

Using AI chatbots poses risks to privacy and data security, but Siri can help mask identity when accessing ChatGPT on iPhones.
#ai
Information security
fromFortune
4 days ago

Anthropic's Mythos is a wake up call, but experts say the era of AI-driven hacking is already here | Fortune

Anthropic's Mythos AI model is too dangerous to release widely due to its ability to exploit software vulnerabilities.
fromwww.theguardian.com
6 days ago
Information security

Anthropic says its latest AI model can expose weaknesses in software security

Claude Mythos exposes thousands of software vulnerabilities, prompting Anthropic to limit its release and collaborate with cybersecurity specialists.
Artificial intelligence
fromFast Company
3 days ago

Is Mythos a blessing or a curse for cybersecurity? It depends on whom you ask

Claude Mythos AI model may enhance cybersecurity defenses but also poses risks for hackers due to its ability to identify vulnerabilities and create exploits.
DevOps
fromTheregister
6 days ago

Rebrand automation as 'zero-token architecture' to master AI

IT professionals can enhance productivity by rebranding existing automations as 'zero-token architecture' to manage AI costs effectively.
Information security
fromTechzine Global
1 day ago

Runtime security becomes critical as AI accelerates threats

Artificial intelligence accelerates innovation and cyber threats, necessitating a focus on runtime security for effective enterprise protection.
Information security
fromFortune
4 days ago

Anthropic's Mythos is a wake up call, but experts say the era of AI-driven hacking is already here | Fortune

Anthropic's Mythos AI model is too dangerous to release widely due to its ability to exploit software vulnerabilities.
Information security
fromwww.theguardian.com
6 days ago

Anthropic says its latest AI model can expose weaknesses in software security

Claude Mythos exposes thousands of software vulnerabilities, prompting Anthropic to limit its release and collaborate with cybersecurity specialists.
Digital life
fromEarth911
6 days ago

Guest Idea: Why Sustainable Home Tech Choices Also Need Cybersecurity Awareness

Sustainable technology adoption is rising, but security risks of connected devices are often overlooked, impacting both environmental and digital safety.
Cars
fromTESLARATI
5 days ago

Tesla issues wake up call to Full Self-Driving hackers and cheats

Tesla is disabling Full Self-Driving capabilities on vehicles using unauthorized hacks in regions where the software is unapproved.
Information security
fromTechzine Global
17 hours ago

Attackers are targeting developers via Slack and Google Sites

A targeted phishing campaign exploits trust in the open-source community, tricking developers into providing credentials and installing malicious software.
Gadgets
fromLondon Business News | Londonlovesbusiness.com
1 day ago

Understanding the impact of smart technology on household energy consumption - London Business News | Londonlovesbusiness.com

Smart home technology requires user action and guidance to effectively reduce energy bills, rather than relying solely on devices for savings.
fromPopular Science
3 days ago

How to stop your smart TV from tracking you

Smart TVs are capable of tracking user data, including viewing habits and app usage, which can lead to personalized advertising and content recommendations. Users may prefer to limit this tracking to protect their privacy.
Privacy technologies
Apple
fromZDNET
5 days ago

Apple's iOS 26.4.1 update enables Stolen Device Protection by default now - grab it today

Apple's iOS/iPadOS 16.4.1 update includes bug fixes, security patches, and resolves an iCloud syncing issue.
Gadgets
fromThe Verge
1 day ago

SwitchBot's button-pressing robot is now available with a rechargeable battery

SwitchBot introduces a rechargeable version of its button-pressing robot, maintaining functionality but offering a more sustainable battery option.
#smart-lock
Wearables
fromgizmodo.com
2 weeks ago

Aqara Smart Lock U400 Review: Hands-free Unlocking at Its Best

The Aqara Smart Lock U400 offers hands-free unlocking using ultra wideband technology and supports multiple smart home ecosystems.
Gadgets
fromThe Verge
2 weeks ago

Nuki's one-touch retrofit smart lock got its first-ever discount

Nuki Smart Lock is a top retrofit option, now priced at $149 during the Big Spring Sale, featuring fast unlocking and Matter-over-Thread support.
Gadgets
fromThe Verge
3 weeks ago

Nuki adds Apple Home Key to its smart lock

The Nuki Keypad NFC 2 introduces tap-to-unlock functionality using Aliro, compatible with Apple and Samsung digital keys for retrofit locks.
Wearables
fromgizmodo.com
2 weeks ago

Aqara Smart Lock U400 Review: Hands-free Unlocking at Its Best

The Aqara Smart Lock U400 offers hands-free unlocking using ultra wideband technology and supports multiple smart home ecosystems.
Gadgets
fromThe Verge
2 weeks ago

Nuki's one-touch retrofit smart lock got its first-ever discount

Nuki Smart Lock is a top retrofit option, now priced at $149 during the Big Spring Sale, featuring fast unlocking and Matter-over-Thread support.
Gadgets
fromThe Verge
3 weeks ago

Nuki adds Apple Home Key to its smart lock

The Nuki Keypad NFC 2 introduces tap-to-unlock functionality using Aliro, compatible with Apple and Samsung digital keys for retrofit locks.
#apple-intelligence
Apple
fromSecurityWeek
5 days ago

Apple Intelligence AI Guardrails Bypassed in New Attack

Researchers have successfully bypassed Apple's AI safety protocols using adversarial techniques, allowing for the execution of arbitrary tasks and manipulation of private data.
Apple
fromTheregister
5 days ago

Security reserchers tricked Apple Intelligence into cursing

Apple Intelligence can be hijacked through prompt injection, exposing millions of users to risk, but a fix was implemented in iOS 26.4 and macOS 26.4.
Apple
fromSecurityWeek
5 days ago

Apple Intelligence AI Guardrails Bypassed in New Attack

Researchers have successfully bypassed Apple's AI safety protocols using adversarial techniques, allowing for the execution of arbitrary tasks and manipulation of private data.
Apple
fromTheregister
5 days ago

Security reserchers tricked Apple Intelligence into cursing

Apple Intelligence can be hijacked through prompt injection, exposing millions of users to risk, but a fix was implemented in iOS 26.4 and macOS 26.4.
Remodel
fromZDNET
2 weeks ago

I didn't have to drill these renter-friendly smart lights into my wall - and I love them for it

Poplight wall lights offer stylish, renter-friendly lighting solutions without damaging walls, featuring a variety of colors and easy assembly.
#ring
Wearables
fromTechCrunch
2 weeks ago

With its new app store, Ring bets on AI to go beyond home security | TechCrunch

Amazon-owned Ring launches an app store to enhance camera capabilities, focusing on elder care, workforce analytics, and rental management.
fromFuturism
1 month ago
Privacy technologies

Hackers Working on Method to Make Ring Cameras Store Footage Locally, Never Giving It to Amazon

Wearables
fromTechCrunch
2 weeks ago

With its new app store, Ring bets on AI to go beyond home security | TechCrunch

Amazon-owned Ring launches an app store to enhance camera capabilities, focusing on elder care, workforce analytics, and rental management.
fromFuturism
1 month ago
Privacy technologies

Hackers Working on Method to Make Ring Cameras Store Footage Locally, Never Giving It to Amazon

Privacy technologies
fromTechCrunch
6 days ago

WireGuard VPN developer can't ship software updates after Microsoft locks account | TechCrunch

WireGuard is locked out of its Microsoft developer account, preventing critical software updates for Windows users.
Privacy technologies
fromArs Technica
6 days ago

How our digital devices are putting our right to privacy at risk

Digital convenience comes at the cost of personal data privacy, raising concerns about its potential use against individuals by law enforcement.
#smart-locks
Apple
fromThe Verge
2 weeks ago

The first Apple Home Key-ready smart lock with UWB is cheaper during Amazon's Big Spring Sale

Aqara's U400 smart lock offers hands-free unlocking for iPhone users and is currently discounted to $229.49 during the Big Spring Sale.
Gadgets
fromgizmodo.com
1 month ago

Level Lock Pro Review: As Good as a Secret Smart Lock Gets

Level Lock Pro is a premium smart lock prioritizing aesthetic design over typical smart lock features, offering invisible integration with traditional deadbolts while sacrificing biometric authentication.
Apple
fromThe Verge
2 weeks ago

The first Apple Home Key-ready smart lock with UWB is cheaper during Amazon's Big Spring Sale

Aqara's U400 smart lock offers hands-free unlocking for iPhone users and is currently discounted to $229.49 during the Big Spring Sale.
Gadgets
fromgizmodo.com
1 month ago

Level Lock Pro Review: As Good as a Secret Smart Lock Gets

Level Lock Pro is a premium smart lock prioritizing aesthetic design over typical smart lock features, offering invisible integration with traditional deadbolts while sacrificing biometric authentication.
Gadgets
fromSlashGear
2 weeks ago

10 Smart Gadgets To Help Upgrade Your Home Office - SlashGear

Investing in smart gadgets for a home office can enhance productivity and organization for remote workers.
Information security
fromThe Hacker News
4 days ago

Browser Extensions Are the New AI Consumption Channel That No One Is Talking About

AI browser extensions pose significant security risks, often overlooked, with vulnerabilities and access that can compromise enterprise networks.
Privacy technologies
fromZDNET
2 weeks ago

5 telltale signs that your phone has been compromised (and how to combat them)

Phone hacking can be detected through signs like battery drain, slow performance, unfamiliar logins, and reduced storage space.
fromThe Verge
1 month ago

Samsung's Digital Home Key lets you use your phone as your key

The new feature, called Digital Home Key, will live inside Samsung Wallet and is powered by the Aliro smart home standard. The new standard uses near-field communication (NFC) for its tap-to-unlock technology. It also supports ultra-wideband (UWB), giving users the ability to unlock their door as they approach and without pulling out their phone.
Mobile UX
Privacy professionals
fromWIRED
1 month ago

Time to Ditch Your Ring Doorbell? Here Are the Best Privacy-Minded Alternatives

Video doorbell footage poses privacy risks through unauthorized access, government surveillance, and potential misuse for racial profiling, though legal protections exist for refusing police requests without warrants.
Gadgets
fromZDNET
1 month ago

How to set up a smart switch to power your home (and what to avoid when you do)

SwitchBot is a battery-operated robotic finger that automates switch pressing, eliminating the need to manually flip switches through smartphone app control via Bluetooth or Wi-Fi.
fromThe Verge
2 months ago

Digital car keys are getting more sophisticated

Need to lend your neighbor your car? The newest version of the digital key specification allows vehicle owners to text a copy of the key to other people. Last month, over a dozen automobile and smartphone manufacturers gathered in Palo Alto, California, for the 16th annual "Plugfest," hosted by the Car Connectivity Consortium (CCC) to test out the latest in digital key technology.
Cars
fromZDNET
1 month ago

Firewalla Orange review: This router gave my home network a meaningful security upgrade

I see a lot of people referring to Firewalla hardware as a firewall or security tool, and while that's correct, it also offers so much more. Think of the tech as having your very own personal network administrator, making even complex networking tasks as simple as flicking a virtual switch.
Gadgets
#smart-home-security
fromZDNET
1 month ago
Privacy technologies

Your smart home may be at risk - 6 ways experts protect your devices from attacks

fromZDNET
2 months ago
Privacy technologies

Should you be afraid of smart home hacking? What it is, and how experts prevent it

fromZDNET
1 month ago
Privacy technologies

Your smart home may be at risk - 6 ways experts protect your devices from attacks

fromZDNET
2 months ago
Privacy technologies

Should you be afraid of smart home hacking? What it is, and how experts prevent it

Gadgets
fromEngadget
1 month ago

The Samsung Wallet can now hold your house keys

Samsung's Digital Home Key feature in Samsung Wallet enables users to unlock compatible smart doors with their phone using biometric authentication or PIN.
fromZDNET
2 months ago

Your default home Wi-Fi setup isn't nearly as private as it should be - 6 free ways to improve it

We live in a time where privacy is something we actually have to work to enjoy. Achieving a level of privacy we once had takes work, and you need to start thinking beyond a single desktop, laptop, tablet, or phone -- all the way to your LAN. Before I scare you all off, understand that this starts on the desktop and extends to the LAN. By beefing up both your devices and your network, you'll achieve a level of privacy that you wouldn't otherwise have.
Privacy technologies
Gadgets
fromThe Verge
1 month ago

The smart lock standard that could replace your keys is finally here

Aliro, an open smart lock standard, enables any smartphone to unlock any compatible smart lock via digital keys stored in phone wallets, eliminating manufacturer fragmentation.
Privacy technologies
fromMedium
1 month ago

The design failures of consumer IoT

Essential anti-theft features in IoT devices are increasingly locked behind paywalls, leaving users vulnerable when subscriptions expire and data collection stops.
Privacy technologies
fromTechCrunch
2 months ago

WhatsApp is rolling out a new stricter security setting to protect users from cyber attacts | TechCrunch

WhatsApp added Strict Account Settings to lock profiles, block unknown media and calls, enable two-step verification, and limit group additions to reduce cyberattack risk.
Information security
fromZDNET
2 months ago

3 security gadgets I never leave home without (and don't break the bank)

Carry an inexpensive kit of physical security tools, like a USB data blocker, to protect devices from malicious chargers, cables, and data theft while traveling.
Privacy technologies
fromFast Company
2 months ago

This new privacy-focused phone service is designed to keep your phone from getting hacked

Cape is a US-wide privacy-focused cellphone carrier that prevents SIM swapping and IMSI-catcher surveillance while minimizing customer data collection and encrypting voicemails.
Gadgets
fromInverse
1 month ago

50 Weird but Genius Home Upgrades That Make Your Home Way Safer

Small, unexpected, and affordable home gadgets can prevent hazards, stop break‑ins, reduce slips, and fix problems early, delivering significant peace of mind.
fromgizmodo.com
2 months ago

SwitchBot Lock Ultra Review: A Good Retrofit Smart Lock for Secondary Doors

The $140 Lock Ultra works just like other retrofit smart locks if you're using it with a typical deadbolt. You swap it for the indoor thumb turn portion, and Bob is, as they say, your uncle. Where it differs is that for $20 more, it comes with an adapter kit that lets it work with jimmy-proof and mortise locks the same way the original SwitchBot lock worked with normal deadboltsrather than replacing your lock hardware, it slips over it and operates it for you.
Gadgets
fromEngadget
2 months ago

Ring can now verify if a video has been altered

Ring has launched a new tool that can tell you if a video clip captured by its camera has been altered or not. The company says that every video downloaded from Ring starting in December 2025 going forward will come with a digital security seal. "Think of it like the tamper-evident seal on a medicine bottle," it explained. Its new tool, called Ring Verify, can tell you if a video has been altered in any way.
Gadgets
fromSecurityWeek
2 months ago

Access System Flaws Enabled Hackers to Unlock Doors at Major European Firms

Vulnerabilities discovered by researchers in Dormakaba physical access control systems could have allowed hackers to remotely open doors at major organizations. The security holes were discovered by experts at SEC Consult, a cybersecurity consulting firm under Atos-owned Eviden, in Dormakaba's Exos central management software, a hardware access manager, and registration units that enable entry via a keypad, fingerprint reader, or chip card.
Information security
fromThe Atlantic
2 months ago

Smart Homes Are Terrible

All of the appliances and systems are brand-new: the HVAC, the lighting, the entertainment. Touch screens of various shapes and sizes control this, that, and the other. Rows of programmable buttons sit where traditional light switches would normally be. The kitchen even has outlets designed to rise up from the countertop when you need them, and slide away when you don't.
Gadgets
Gadgets
fromArchitectural Digest
1 month ago

The Spectrum of Home Security Today-From Sensors to Safe Rooms

Modern home security uses discreet, AI-enabled sensors, cloud storage, and professional integrations, making devices critical for evidence and design-integrated protection.
fromZDNET
2 months ago

I created the ultimate Wi-Fi password key with the most unexpected gadget - how it works

I'm blown away that I can write data to a little chip and then access that using a phone or tablet. I've embedded NFC tags into all sorts of things, from documents to business cards to 3D-printed objects. And it's easy! What you'll need You need two things: NFC tags: These come in all sorts of shapes and sizes, from to to .
Gadgets
fromBusiness Matters
2 months ago

Why More UK Homeowners Are Upgrading Their Door Locks in 2026

Home security has become a growing concern for UK households, and in 2026, many homeowners are taking a closer look at something that's often overlooked: their door locks. While alarms, cameras and lighting tend to dominate conversations around home security, experts are increasingly pointing to door locks as one of the most important - and vulnerable - parts of a property's defenses. As burglary methods evolve and older hardware struggles to keep up, upgrading door locks is quickly becoming a priority rather than an afterthought.
Gadgets
Gadgets
fromTechCrunch
2 months ago

Ring is adding a new content verification feature to videos | TechCrunch

Ring Verify will indicate whether Ring camera videos have been altered, alert recipients to edits, and allow requesting unedited original footage.
fromWIRED
2 months ago

What Is Thread? We Explain the Smart Home Network Protocol

Originally developed by Nest (before the Google acquisition), Thread has existed since 2011. Devised as a power-efficient mesh networking technology for internet-of-things (IoT) products, Thread gathered pace after the 2014 formation of the Thread Group, which develops the technology and drives its adoption as an industry standard. Founding members like ARM, Samsung, Google, and Qualcomm have been joined by Apple, Amazon, and many other big companies over the years.
Gadgets
[ Load more ]