Amazon now has a portable version of the Echo, along with the Echo Dot, which are designed to augment existing installations with the Echo.
Source: Alexa goes mobile with new Amazon Tap and Echo Dot for smart homes | ZDNet
![]()

Amazon now has a portable version of the Echo, along with the Echo Dot, which are designed to augment existing installations with the Echo.
Source: Alexa goes mobile with new Amazon Tap and Echo Dot for smart homes | ZDNet
![]()
NSA chief Michael Rogers argues against a presidential commission’s proposal to restrict the NSA to foreign intelligence, and asks the tech industry for help
Source: NSA seeks to combine offense and defense in its spy efforts
![]()
Malware and hackers are more sophisticated and more dangerous than ever, and it’s up to you to protect yourself. Our top free antivirus utilities can help.
Source: The Best Free Antivirus Utilities for 2016
![]()
Um… wrong website guys…
The Caliphate Cyber Army attacked Add Google Online instead.
Source: ISIS hackers targeting Google get the wrong one
![]()
The Internet of Things will bring many benefits, but it’s also creating a security nightmare for which few are prepared.
Source: Internet of Things: Finding a way out of the security nightmare | ZDNet
![]()
Until recently, sample wasn’t detected by any of the top antivirus programs.
Source: Largely undetected Mac malware suggests disgraced HackingTeam has returned
![]()
Jerome Segura, a senior security researcher with Malwarebytes, was recently stumped by a cyberattack he was studying. It seemed to keep vanishing.
Source: Malicious, malware-peddling ad campaigns are becoming trickier to detect | PCWorld
![]()
New service can detect network breaches by spotting unusual system behavior.
Source: Windows Defender Advanced Threat Protection uses cloud power to figure out you’ve been pwned
![]()