Holiday gifts getting smarter, but creepier when it comes to privacy and security
A Hamilton Beach Smart Coffee Maker that could eavesdrop, an Amazon Halo fitness tracker that measures the tone of your voice, and a robot-building kit that puts your kid’s …
Exabeam SMP enhancements help orgs defend against threats to cloud-based data
Exabeam announced a major enhancement to the Exabeam Security Management Platform (SMP), enabling organizations to detect improper access of cloud storage objects and defend …
Protegrity supports Amazon Redshift to provide advanced data protection
Protegrity announced support for Amazon Redshift, a fully-managed petabyte scale cloud data warehouse. Organizations with high data-security and IT requirements can now deploy …
Windstream Enterprise adds Google Assistant and Amazon Alexa to its SD-WAN solution
Windstream Enterprise (WE) has added new Google Assistant and Amazon Alexa voice command features to its SD-WAN solution, enabling network administrators to work more …
Amazon introduces eero Pro 6 and eero 6, delivering Wi-Fi 6 performance
Amazon introduced the newest additions to the eero family—eero Pro 6 and eero 6. These all-new mesh wifi systems feature Wi-Fi 6, the latest technology delivering faster …
CloudPassage migrates fully-containerized microservices architecture to Amazon EKS
CloudPassage announced that it has migrated the fully-containerized microservices architecture of its Halo cloud security and compliance platform to the fully-managed …
Zoom for Home expands to smart displays, integrates with Facebook, Amazon and Google
Zoom announced that Zoom for Home is expanding to smart displays including Amazon Echo Show, Portal from Facebook, and Google Nest Hub Max, bringing Zoom to widely-used …
Amazon establishes Counterfeit Crimes Unit with dedicated global team
Amazon announced it has established a new Counterfeit Crimes Unit, dedicated to bringing counterfeiters that violate the law and Amazon’s policies by listing counterfeit …
New technique protects consumers from voice spoofing attacks
Researchers from CSIRO’s Data61 have developed a new technique to protect consumers from voice spoofing attacks. Fraudsters can record a person’s voice for voice …
Would you trust Amazon Alexa more if given the option to adjust privacy settings?
Giving users of smart assistants the option to adjust settings for privacy or content delivery, or both, doesn’t necessarily increase their trust in the platform, …
Vulnerability allows attackers to register malicious lookalikes of legitimate web domains
Cybercriminals were able to register malicious generic top-level domains (gTLDs) and subdomains imitating legitimate, prominent sites due to Verisign and several IaaS services …
The 25 most impersonated brands in phishing attacks
PayPal remains the top brand impersonated in phishing attacks for the second quarter in a row, with Facebook taking the #2 spot and Microsoft coming in third, according to …
Featured news
Resources
Don't miss
- Ivanti provides temporary patches for actively exploited EPMM zero-day (CVE-2026-1281)
- Google disrupts proxy network used by 550+ threat groups
- eScan AV users targeted with malicious updates
- Google agrees to pay $135 million over Android data harvesting claims
- SolarWinds fixes critical Web Help Desk RCE vulnerabilities, upgrade ASAP!