Where to Connect to Free Wi-Fi? How to Protect Your Privacy

Where to Connect to Free Wi-Fi? How to Protect Your Privacy

Such situations can happen to anyone. You need to complete a project, download files, or track some information, and you really need to connect to some wireless networks. Whether you are at home, in your office, or traveling in an unfamiliar city, you know that the urgently needed free Wi-Fi networks are around you, but … Read more

Smart Home Privacy Exposed? CUHK and Others Use LSTM to Tackle IoT Security Settings

Smart Home Privacy Exposed? CUHK and Others Use LSTM to Tackle IoT Security Settings

Original by Machine Heart Author: Lu Xinfeng Editor: Joni In August of this year, Professor Zhang Kehua’s research group at the Chinese University of Hong Kong published a paper on arXiv, showcasing their research on the privacy of smart homes. The authors attempted to use an LSTM model to predict active devices in smart homes. … Read more

Prevent Smart Home Surveillance: Don’t Let Your Data Run Wild

Prevent Smart Home Surveillance: Don't Let Your Data Run Wild

Today, smart home products such as smart doorbells, home surveillance cameras, robotic vacuum cleaners, and smart speakers are becoming increasingly common in households. In March this year, the “data scandal” involving smart homes was exposed, revealing that smart home devices have become “eavesdroppers,” turning into “surveillance tools” in an instant, with cloud cameras becoming “leakage … Read more

Analysis of the Current Status and Development Trends of the IoT Security Industry in 2025

Analysis of the Current Status and Development Trends of the IoT Security Industry in 2025

Click the “blue text” above to select “Set as Favorite“ Key information, delivered on D1 time! With the rapid development and popularization of IoT technology, IoT security, as an important application of IoT technology in the security field, is gradually changing the landscape of the traditional security industry. IoT security achieves real-time monitoring, early warning, … Read more

PLC Intelligent Algorithms: The Application of Federated Learning Technology Balancing Data Privacy and Model Performance!

PLC Intelligent Algorithms: The Application of Federated Learning Technology Balancing Data Privacy and Model Performance!

PLC Intelligent Algorithms: The Application of Federated Learning Technology Balancing Data Privacy and Model Performance! Introduction Hello everyone! Today I want to share with you a **new technology that will impress the industrial automation field — PLC Federated Learning Algorithm. Don’t worry, I will explain this seemingly “black technology” concept in the simplest terms.Mastering this … Read more

Your Smart Speaker Might Be ‘Listening’! Important Considerations When Using Smart Home Devices

Your Smart Speaker Might Be 'Listening'! Important Considerations When Using Smart Home Devices

With the popularity of artificial intelligence and Internet of Things (IoT) technologies, smart home products such as smart locks, robotic vacuum cleaners, and smart whole-house temperature control systems are becoming increasingly common. It is important to note that if sensitive data from smart home products is exploited by malicious individuals, it could lead to information … Read more

Apple and Google Collaborate: Your Phone’s Bluetooth Can Be Used to Track COVID-19 Close Contacts

Apple and Google Collaborate: Your Phone's Bluetooth Can Be Used to Track COVID-19 Close Contacts

Reporter: Lu Keyan “ The tool primarily relies on the Bluetooth functionality of mobile phones. “ On April 10, Apple CEO Tim Cook and Google CEO Sundar Pichai jointly announced on Twitter that the two companies will collaborate to connect Apple and Android mobile systems to launch a plan for tracking the spread of the … Read more

Smart Speakers Can Hear Your Passwords

Smart Speakers Can Hear Your Passwords

Click the blue text to follow us In the past two years, people have been concerned that popular mobile apps and smart speakers/voice assistants could leak personal privacy information, but the reality is scarier than we imagined. Recently, researchers from the University of Cambridge discovered that any smart device capable of receiving voice commands (such … Read more

We Experienced an Apple Smart Home Apartment and Discovered Several Truths About HomeKit

We Experienced an Apple Smart Home Apartment and Discovered Several Truths About HomeKit

At the entrance, there is a password lock on the door handle, and as long as the phone has power, it can issue commands to Siri; stepping into the foyer, saying “I’m home” to Siri lights up the lights throughout the house, and the air purifier’s fan starts to run smoothly—this is a preset HomeKit … Read more

Students Hack Under-Desk Sensors Installed by University and Create Open Source Guide

Students Hack Under-Desk Sensors Installed by University and Create Open Source Guide

Produced by Big Data DigestAuthor: CalebOn a night in early October, a significant project was underway at the Interdisciplinary Science and Engineering Complex (ISEC) at Northeastern University in the United States.According to PhD student Max von Hippel from the Privacy Institute, sensors were being installed under all the desks in the building that night. ISEC … Read more