Insteon Smart Home system have shut down but it seems its hundreds of customers who own various Insteon products were not informed.
Search: smart home
Matter Smart Home Standard Delays Release Until Fall 2022
The first cross-platform protocol for smart home technology, the Matter smart home standard, is delayed but expected to launch in Fall 2022.
Security Friday: Smart Home Practical Tips – TMO Daily Observations 2022-01-07
Andrew Orr and host Kelly Guimont chat about Security Friday news and updates, including tips on keeping your smart home gear safe and secure.
Smart Home Tips and CES Announcements – TMO Daily Observations 2022-01-04
Jeff Butts joins host Kelly Guimont to discuss smart home CES announcements and a tip for devices that aren’t officially supported by HomeKit.
Eve Launches Two Firsts in the Smart Home Industry
In two smart home categories, Eve is breaking ground with industry firsts. You can automate your blinds with Thread and take Eve Cam outside.
Eve Smart Home Holiday Deals for Last-Minute Shopping
Eve Smart Home accessories make excellent gifts. These last-minute discounts will help you save on your shopping spree.
South Korean Hack Shows Need for Better Smart Home Security
A recent string of hacks on South Korean apartment complexes makes the need for better smart home security crystal clear.
Last-Minute Cyber Monday Smart Home Deals
These Cyber Monday smart home deals are waiting. Get your HomeKit accessories at prices you likely won’t see again for quite some time.
Sleep Technology Meets the Smart Home with ReST
Sleep technology has really taken off, and we even have smart beds now. Let’s see how well the ReST Smart Bed performs for this techie.
New 'BotenaGo' Targets Routers and Smart Home Devices in Devastating Attack
AT&T Alien Labs discovered malware it dubs BotenaGo. It affects millions of routers and Internet of Things devices found with smart homes. The “devastating” part comes from the fact that it uses over 30 separate exploits due to insecure devices.
The BotenaGo malware starts by initializing global infection counters that will be printed to the screen, informing the hacker about total successful infections. It then looks for the ‘dlrs’ folder in which to load shell scripts files. A loaded script will be concatenated as ‘echo -ne %s >> ‘. If the ‘dlrs’ folder is missing, the malware will stop and exit at this point. For the last and most important preparation, the malware calls the function ‘scannerInitExploits’, which initiates the malware attack surface by mapping all offensive functions with its relevant string that represent the targeted system.