In a new study of leading robot manufacturers, most had serious security vulnerabilities which could allow hackers to take over and reprogram the robots to spy on their owners, cause property damage, or even attack humans.
Teens grab up smartphones faster than other age groups A new study shows 58 percent of U. teen mobile owners have a smartphone instead of a feature phone. Overall, smartphone owners opt for Android devices over iPhone and BlackBerry.
IoT: Case studies on fog computing and the Intel IoT Kit
Increased complexity means more attach surfaces. Edge computing is the way to go for IoT, but it requires the right security mechanisms. You cannot trust the network but have to take charge of the security and privacy issues in the application, through, for instance, end-to-end payload encryption.