What Your EufyLife Scale Knows About You | Avast
Eufy is a company that does a bunch of different smart devices. They’ve got household appliances like robovacs, security devices like video doorbells, and — in my house — they have a smart scale.
Eufy is a company that does a bunch of different smart devices. They’ve got household appliances like robovacs, security devices like video doorbells, and — in my house — they have a smart scale.
Data privacy legislation is a difficult topic to get your head around. There can be multiple dimensions, sector-specific rules, and various national and, in some cases (such as in the US), local laws enacted to cover a multitude of issues.
If you’ve thought about weight loss in the past year or so — or if you’ve listened to a podcast or been on Instagram — you’ve probably heard of Noom. Noom is a new(ish) weight loss program that focuses less on calorie counting and more on the psycholog…
If you’ve thought about weight loss in the past year or so — or if you’ve listened to a podcast or been on Instagram — you’ve probably heard of Noom. Noom is a new(ish) weight loss program that focuses less on calorie counting and more on the psycholog…
I may have mentioned it once or twice before, but I used to work in a data protection regulator, so – as you can imagine – I have some fairly strong views about the importance and role of regulation in protecting and vindicating the data protection and…
I may have mentioned it once or twice before, but I used to work in a data protection regulator, so – as you can imagine – I have some fairly strong views about the importance and role of regulation in protecting and vindicating the data protection and…
For decades, the cornerstone of IT security has been Public Key Infrastructure, or PKI, a system that allows you to encrypt and sign data, issuing digital certificates that authenticate the identity of users.
I would like to take a step back to take in a broader, bigger picture than usual in this article, moving across time as well as into the legal sphere. Technology isn’t just hardware and software; it’s a fundamental component of every aspect of our live…
Avast researchers have found that Android flashlight applications request an average of 25 permissions to access data or features on mobile devices, potentially exposing users in unnecessary ways.
A security researcher discovered an exposed server that contained several databases of information on over 419 million Facebook accounts, Tech Crunch reported. Predominantly listing users’ phone numbers and Facebook IDs, the server also exposed other b…