Toy firm Vtech has updated its terms and conditions, transferring the blame on future breaches to their users. In light of this, what can you do when you're dealing with a product that admits to having weak security?
Understanding the ecosystem of hardware, software, and services used in each organization’s network, the data/telemetry collected and sent outside it, as well as the challenges caused by the emergence of the Internet of Things (IoT).
The future is starting to take shape as the concept of the Internet of Everything (IoE) is applied to everything from smart home appliances to connected wearables. And it doesn't look like a fad that's going to pass.
CES 2015 featured a Personal Privacy & Cyber Security Marketplace where security-oriented products were put on display. We looked at the devices covered in CES 2015 and spotted these technologies that focused on better privacy and data security.