Fourteen Internet protocols could be used for large-scale DDOS attacks; six could be used as amplifiers pushing attacks orders of magnitude beyond the norm.
Competitor sues to keep leading coffee-pod maker Keurig from adding tech that will block unlicensed coffee pods from its machines.
Security firms conclude there are so many vulnerabilities in home routers, the hardware is almost impossible to secure.
Even properly implemented, the HNAP remote-access management protocol is hardly better than having no login security at all, experts warn.
In the remote control, physical computing and Internet of Things ecosystem, it’s frequently convenient to command something to move using …
Look for more staff cuts at IBM – especially in hardware – after the company’s quarterly earnings fell below analysts’ …
For Christmas, my daughter gave me a couple of Digispark boards. These little, relatively Arduino-compatible, ATtiny85 micro-controller, USB-equipped wonders are …
Bonded with ionic silver, the glass is partially intended for industries where a lot of people tap and swipe the same touch-screens.
The “Temperfect” mug’s phase-change insulation keeps coffee at the right temperature long enough for even busy datacenter sysadmins to drink it hot. For once.
WiTrack’s ability to locate humans wherever they are in a house, and identify gestures or individual body parts, could make it the next-gen Xbox Kinect.