
Smart Today, Scrap Tomorrow: How Belkin Has Broken The Promise Of IoT
A Belkin Wemo Insight Switch smart plug, taken on August 16, 2017. (Photo by Olly Curtis/T3 ... More Magazine/Future via Getty Images)
Belkin dropped the bomb to customers last week confirming it will end its support for their Wemo smart home device range on 31st January 2026. No workaround, no software updates, and no plan to hand over control to users. Just a shutdown notice and lots more raw material for landfill.The devices don't have a serious flaw; they haven't failed, but they are about to cease to function for their intended purpose because Belkin simply no longer wants to support the infrastructure they depend on. It's a business decision that will affect millions of users*And that's the flaw at the heart of the Internet of Things (IoT) dream that brands bought into in the early 2010s – the moment a company decides your connected product is no longer worth their time or money, it simply becomes e-waste.But when manufacturers like Belkin turned 'dumb' products into smart solutions, they took on a responsibility – maintaining a connected infrastructure. Now, instead of owning the problem, they're walking away from it. And in their case, they've done this for a second time.IoT was never supposed to be like this.Back in those heady smart-home days of 2013/14, and in many previous waves before that, we were promised a smarter world: intelligent homes, effortless automation and seamless integration. But it's now clear that many companies treated the opportunities presented by IoT like any other consumer electronics trend – a sales opportunity to exploit rather than true innovation and a long-term commitment to uphold.Unlike previous waves of devices that promised smarthome utopia, this time the dropping of support permanently renders the devices useless.My TRS-80 from 1977 had a 'Plug'n Power" add-on. It provides the same functionality as the Wemo, but 48 years later functions exactly as well as it did the day it was new.I also have a 1996-era 'Home Director' system from IBM. Running Windows 95, it's not a practical solution to control my home30 years later, but it still works exactly as intended.The difference? The 21st Century era devices are all 'Cloud Tethered' - taking us all a step closer to Technofeudalism and the antithesis of utopian automation that is the dream of enthusiasts of this field.Belkin is aware that severing the Cloud Tethering is 'change [that] may disrupt your routines'. As someone who owns 41 Wemo smart plugs, I'm painfully preparing for this disruption. I've invested a huge amount of time and money installing and configuring their system. They work in perfect harmony and have done so flawlessly for over a decade. But now I must spend an entire weekend or more of transferring to their Zigbee/ Zwave equivalents. My 'digital housework' workload is about to become a major challenge. It's the digital equivalent of the roof falling in. Except I've got 6-months to prepare, but no-one except me who can fix it (and no insurance to come to my rescue)!
Close-up photograph of a white, "Wemo" brand plug, used to control home electronics remotely, San ... More Ramon, California, USA, November 3, 2018
There is some 'good' news. Belkin has learnt lessons from the NetCam debacle by providing more time to switch. But I believe there's a better way of doing things:Belkin clearly knows this announcement won't land well either — the email includes three separate apologies. But instead of hiding behind vague corporate language, they'd have done better to be honest. Imagine if they had written:'Back in 2011, we saw a market opportunity and launched Wemo. In hindsight, we underestimated the complexity of supporting a smart home ecosystem. We now realise we can't sustain the Wemo platform long-term. That's why we're giving you three years to transition to a new system. We're truly sorry to let you down – reliability and trust are core to our brand, and we know we've fallen short.'And imagine if they went further:
'And as part of our end-of-life programme for these smart devices, we're releasing one final firmware update which will open the protocols used to connect to the Wemo device and allow you to control it via third-party applications. We'll be updating the Wemo app also to make it easier for your transition to another system, and hope that these devices continue to function for years, or even decades to come. With a vibrant open-source smarthome community such as those provided by Domoticz and other groups - we're confident that your investment in these product and our brand will not have been wasted.'Or further still?'Oh, and we're releasing the Wemo source code on GitHub so the opensource community can build and improve on the foundations we've laid. And we're providing full schematics and technical documentation to iFixit so that the repair community can keep our excellently designed and crafted Wemo devices in service for the long term. After all, our organization is made up of people who want to leave the planet a better place for our children and future generations. We remain forever and authentically passionate about renewing our commitment to a circular economy and carbon neutrality and continuing our pledge to support the Paris Agreement.'Well, the last sentence is actually a genuine quote from their CEO, Steve Malony a few years back. His commitments are perhaps not as authentic or long-lasting as they might have been intended.Belkin's decision to brick more of its devices is just the latest example of a broader industry blind spot. It's a failure to respect the long-term obligations of smart infrastructure. It also flies in the face of the environmental promises many tech companies like to make. I'm now soon to be left with a pile of perfectly usable devices destined for landfill, purely because of lazy software engineering, and poor business planning.The decision to retire these Wemo products will certainly create a huge amount of e-waste, but I dread to think the impact that a decision by Amazon or Philips will have when they bring to an end their own smart home products like Alexa and Hue lightbulbs.One simple business decision has major environmental impact and leave millions of customers with the task of 'upgrading' to a new system. In the case of Amazon - they have somewhere towards 100-200x more smartdevices in the market than Belkin did with the Wemo. Let's hope they act more responsibly when the time comes.If we want a sustainable, trustworthy, and truly 'smart' future for our homes, this isn't it. I just hope we get there before the IoT dream is shattered for all time. Trust in Belkin might be shot, but there is still opportunity for others to get this right. * Google Play store confirms the Wemo happ has been downloaded 1M+ times. Based on the 56.9k reviews (mostly negative), and a 1:50 download to review ratio: this leave us with an estimated number of 2.8M users globally. Assuming Google Play devices have a market share of 70%, we can therefore extrapolate there to be approximately 4M Wemo users globally.
** I of course approached Belkin for comment on this story before publishing, but at time of writing there are still *crickets* from their press team. If they squeak, I'll be sure to update.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles
Yahoo
23 minutes ago
- Yahoo
China launches world's first robot that can run by itself 24/7 — watch it change its own batteries in unsettling new footage
When you buy through links on our articles, Future and its syndication partners may earn a commission. There are many weird and wonderful humanoid robots out there, but one of the most eye-catching machines launched this year can change its own battery pack — making it capable of running autonomously for 24 hours a day, seven days a week. The Walker S2 robot, made by the Chinese company UBTECH, is 5 foot 3 inches (162 centimeters) tall and weighs 95 pounds (43 kilograms) — making it the size and weight of a small adult. Using a 48-volt lithium battery in a dual-battery system, the robot can walk for two hours or stand for four hours before its power runs out. The battery takes 90 minutes to fully recharge once depleted. Its most interesting feature — which UBTECH representatives say is a world first — is that instead of relying on a human operator to remove and recharge its battery pack, the machine can perform this task entirely on its own. In new promotional footage published July 17 on YouTube, the Walker S2 robot is seen approaching a battery charging station to swap out its battery supply. Facing away from the station, it uses its arms to remove the battery pack fitted into its back and places this into an empty slot to recharge. It then removes a fresh battery pack from the unit and inserts it into its port. RELATED STORIES —Watch humanlike robot with bionic muscles dangle as it twitches, shrugs and clenches its fists in creepy video —Watch humanoid robots waltzing seamlessly with humans thanks to AI motion tracking software upgrade —Intrepid baby-faced robot dons a jetpack for its next adventure — becoming the first humanoid robot to fly The robot will swap out its own battery in the event that one of its batteries runs out of power. It is also capable of detecting how much power it has left and decides whether it is best to swap out one of its batteries or charge based on the priority of its tasks, company representatives said, as reported by the Chinese publication CnEVPost. The Walker S2, which is designed to be used in settings like factories or as a human-like robot to meet and greet customers at public venues, has 20 degrees of freedom (the number of ways that joints or mechanisms can move) and is also compatible with Wi-Fi and Bluetooth.


Geek Vibes Nation
an hour ago
- Geek Vibes Nation
Understanding Malware Attacks: How To Protect Your Digital Assets
Introduction The anti-virus era of the 1990s gave many people the impression that malware was a solved problem, but statistics from Verizon's 2024 Data Breach Investigations Report show otherwise: malicious code factored into 40 percent of all confirmed breaches last year. Hybrid work means laptops regularly leave corporate firewalls; cloud applications blur traditional perimeters; and inexpensive IoT sensors add thousands of unmanaged endpoints to every network. Against that backdrop, even a modest malware campaign can leapfrog across business units in minutes. This article demystifies how modern malware operates and-more importantly, you can disrupt it with practical, layered defenses. Malware 101 – Definitions and Core Concepts Malware, virus, trojan – 'Malware' is the umbrella term for any malicious software. A virus self-replicates by attaching to other files, whereas a Trojan masquerades as something benign to trick users into launching it. Payload goals – Criminals rarely infect systems 'just because.' Common motives include intellectual-property theft, extortion, sabotage of competitors, and long-term espionage. The attack chain – Most outbreaks follow four repeatable phases: initial access, code execution, persistence, and finally exfiltration or destructive impact. Understanding that sequence is vital when you plan how to protect against Malware attacks – the sooner you interrupt any one phase, the less remediation effort you face. Most Prevalent Malware Types in 2025 Ransomware focuses on encryption and extortion. LockBit 4.0 can cripple a small firm before the help-desk phones start ringing. Information stealers such as RedLine vacuum up browser cookies, saved passwords, and crypto-wallet keys within seconds of execution. Botnets based on Mirai variants conscript routers, cameras, and even smart printers to launch DDoS storms or covert crypto-mining. File-less malware uses built-in tools like PowerShell to operate only in memory, leaving little forensic evidence on disk. Mobile spyware (Pegasus clones) hijacks microphones and GPS on both consumer and corporate smartphones. Microsoft's latest Digital Defense Report reveals that credential-harvesting info-stealers now precede 45 percent of ransomware incidents, underscoring how intertwined these categories have become. How Malware Gains Entry Phishing & social engineering – slick invoices, AI-generated voice messages, or SMS links lure users into installing droppers. Unpatched software – VPN appliances, browsers, and hypervisors with unmitigated CVEs are still the fastest on-ramp for automated scanners. Malvertising & drive-by downloads – poisoned ad networks can sideload code without a single click. Supply-chain compromise – attackers seed malicious updates in open-source repositories like npm or PyPI, scoring thousands of downstream infections at once. Warning Signs Your System May Be Infected Fans spin loudly while CPU usage spikes for no obvious reason. Browser settings change, or unwanted pop-ups appear. Unknown services establish outbound connections to rare IP ranges or TOR nodes. Endpoint protection suddenly turns itself off or fails to update signatures. Spotting these anomalies quickly gives responders a chance to cut lateral movement before backups are wiped. Five Pillars of Malware Defense Patch & Update. Automate updates so critical CVEs are closed within 72 hours. Strong Identity Controls. Mandate phishing-resistant MFA, start with remote-access portals. Endpoint & Email Security. Deploy EDR/XDR, activate attachment sandboxing, and enforce DMARC on all domains. Backup & Recovery. Adopt the 3-2-1 rule with at least one immutable copy stored offline; verify restores every month. User Awareness. Replace annual slide decks with quarterly micro-training plus gamified phishing tests. Google's Threat Horizons Report confirms that organizations combining EDR with immutable backups reduce average recovery costs by 86 percent compared with peers that rely on legacy AV alone. Incident-Response Checklist (First 24 Hours) Isolate affected endpoints-unplug Ethernet, disable Wi-Fi, and block switch ports. Collect evidence immediately: Windows event logs, EDR quarantines, suspicious binaries. Assemble the IR team including IT ops, legal, executive sponsors, and (if applicable) the cyber-insurance hotline. Identify the strain through VirusTotal, ID-Ransomware, or your security vendor-free decryptors occasionally exist. Eradicate & patch the initial vector before any production restore to avoid instant re-infection. Beyond Technology – Legal and Business Considerations Regulations such as GDPR, HIPAA, and the SEC's new four-day breach-disclosure rule create steep fines for delayed reporting. Cyber-insurance carriers increasingly require MFA, EDR, and documented steps to recover from a malware attack before underwriting; non-compliance could void your claim when you need it most. Future Trends to Watch AI-generated malware will create polymorphic binaries that morph faster than signature engines can respond. Post-quantum encryption transitions will leave legacy VPNs and TLS implementations vulnerable. Edge & 5G threats will move ransomware into factories and autonomous fleets, where downtime is measured in lost production minutes. Closer alliances between cloud platforms and law enforcement promise faster takedowns, but criminals will also pivot to decentralized storage and command-and-control. Conclusion Malware will never disappear, but its impact is a variable you can shrink dramatically. Patch relentlessly, enforce identity safeguards, and rehearse incident playbooks until they feel routine. The goal is not just to survive the next attack; it is to detect, contain, and restore so quickly that criminals search for softer targets elsewhere. Frequently Asked Questions Q1: Should I ever pay a ransom if malware encrypts our systems? Payment is risky. Decryption keys may fail, and you could violate sanctions. Consult legal counsel, your cyber-insurer, and law enforcement first. Robust offline backups paired with a rehearsed recovery plan almost always cost less than both ransom and downtime. Q2: How often should we run phishing simulations? Quarterly exercises strike a balance between staff fatigue and skill reinforcement. Vary scenarios-invoice scams one quarter, voicemail deepfakes the next to build broader resilience. Q3: What is the single most effective control for small businesses on a tight budget? Phishing-resistant MFA on email and remote-access portals blocks the credential-theft vector behind roughly 90 percent of successful malware campaigns. Many cloud suites include token-based MFA at no extra cost.


Forbes
2 hours ago
- Forbes
What Could Derail The Bull Market Rally?
NEW YORK - JUNE 19: A view of the brass Wall Street bull statue stands at a lower Broadway park at ... More Bowling Green June 19, 2012 in New York City's financial district. (Photo by) As I concluded my last Forbes column (Wall Street's Tightrope: Why Smart Money Is Fleeing U.S. Assets), I noted , 'Short term, the setup is there for a relief rally. The market is deeply oversold, and sentiment is at extremes.' That tactical bounce off the April lows wasn't just robust—it shocked seasoned investors, myself included. The force and speed of the S&P 500's rally underscored just how swiftly risk sentiment can turn from caution to euphoria, and reminded us never to underestimate the animal spirits driving this market. From Strength to Vulnerability With equities at record highs and nominal growth boosted by legislation like the 'One Big Beautiful Bill' (OBBB), it's tempting to think the cycle can keep running. Fiscal spending, tax incentives, and reforms have all contributed to strong consumer and corporate results. But lurking beneath the surface is a structural risk that could upend equity valuations and market leadership: a renewed surge in the U.S. Treasury term premium. What Is the Term Premium? Term premium is the extra return investors demand for holding long-term government bonds rather than rolling short-term debt, compensating for uncertainty about inflation, fiscal policy, and future interest rates. Think of it as the market's way of saying, 'If you want me to tie up my money for a decade or more, pay me for the unknown risks.' Term Premium Chart: 1960s–2025 This chart shows estimates of the term premium for maturities of one to ten years, spanning from ... More 1961 to the present. Treasury term premium is estimated by current and former New York Fed economists Tobias Adrian, Richard Crump & Emanuel Moench. From the 1960s through the mid-1980s, the 10-year Treasury term premium was commonly 2–4%, reflecting the high inflation and policy uncertainty of the era. Between the mid-1980s and 2007, the premium receded to an average 1.5–2.5%. After the financial crisis, it plunged toward zero and occasionally negative. As of mid-2025, the premium has rebounded to about 0.75%—but history shows it can go much higher. How High Could Term Premium Go? If the term premium were simply to revert to its long-term average of 1.5%, or approach its pre-2008 mean near 2%, that would imply an upside risk of 75–125 basis points on 10-to-30-year Treasury yields from current levels. With deficits large and persistent, and the OBBB amplifying fiscal pressures, the conditions are in place for a further jump. This shift would not only raise discount rates across the capital markets but would also directly pressure valuations—especially for long-duration equities like those dominating the NASDAQ. Conclusion: Are Markets Prepared? Equity bulls have plenty to cheer, but they're paying up for the privilege: according to Ned Davis Research, the S&P 500 trades at 29x trailing GAAP earnings and the NASDAQ Composite now boasts a P/E of 48x. These demanding valuations leave broad markets—especially the NASDAQ—exposed to even a modest move higher in yields. If the term premium continues its ascent back toward historical norms, volatility could spike, and market leadership may abruptly reverse. With risks mounting, investors need to ask: are markets truly prepared for their most important cost of capital to spike higher?