{"id":1832,"date":"2017-03-24T13:01:00","date_gmt":"2017-03-24T13:01:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/review-canary-flex-security-camera-lives-up-to-its-name\/"},"modified":"2017-03-24T13:01:00","modified_gmt":"2017-03-24T13:01:00","slug":"review-canary-flex-security-camera-lives-up-to-its-name","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/review-canary-flex-security-camera-lives-up-to-its-name\/","title":{"rendered":"Review: Canary Flex security camera lives up to its name"},"content":{"rendered":"<p>Canary\u2019s initial foray into the networked home security camera space was very impressive \u2013 my colleague David Newman <a href=\"http:\/\/www.networkworld.com\/article\/3159089\/security\/review-home-security-cameras-fall-short-on-security.html\">touted its high security settings in the wake of revelations about the general insecurity of these types of devices<\/a>. The Canary camera was also somewhat large \u2013 a cylindrical tower that took up some significant space on your desk, cabinet or shelf.<\/p>\n<p>The latest camera the company sent me is the <strong>Canary Flex<\/strong>, a much smaller unit meant to be more flexible (hence the name) in terms of placement, but also in power options. Like the Arlo Pro camera, the Canary Flex is powered by an internal battery (it\u2019s charged via USB cable and power adapter). This means you can move the Flex to a location inside or outside your home where there\u2019s no power outlet. The Flex comes with wall mounting screws and a 360-degree magnetic stand so you can position the camera in different spots. Additional accessories, such as a plant mount or twist mount (pictured below), offer even more location choices.<\/p>\n<p>One big difference between the Flex and Arlo Pro \u2013 the Arlo features removable batteries \u2013 with the Flex, you need to plug the cable back into the camera for a recharge. Fortunately, Canary includes a very long USB power cable here, improving the distance needed between a camera placement and power source.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/images.techhive.com\/images\/article\/2017\/03\/canaryflextwistmount-1200-100714768-large.jpg\" border=\"0\" alt=\"Canary Flex TwistMount\" width=\"700\" height=\"467\" data-imageid=\"100714768\"\/><small class=\"credit\"><a href=\"http:\/\/canary.is\" target=\"_blank\" rel=\"nofollow\">Canary<\/a><\/small><\/p>\n<p>The Canary Flex TwistMount (sold separately) gives you more placement options for the camera, like in a garage to monitor who keeps taking your shovel.<\/p>\n<p>The camera provides HD video to a smartphone app, which you can view while you\u2019re at home (on the same Wi-Fi network) or not at home (over the Internet). The camera itself connects to your home Wi-Fi network, with the box gleefully explaining, \u201cWi-Fi enabled, no hubs, no hassles\u201d \u2013 a dig at the Ethernet-connected base station required by Arlo. There\u2019s audio on the camera, but only one-way \u2013 you can hear what\u2019s going on (and get alerts if the audio is triggered), but you can\u2019t respond in kind. There\u2019s also no siren capability to scare off any intruders.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 smartphone\" id=\"\"\/>\n<p>To set up the Flex, you plug it in and download the Canary app. First-time users need to create an account with a password. Since I had tested the earlier Canary camera, I still had an account (although I disabled the access to the camera for Newman\u2019s camera test). Once logged in, I could set up the new camera via the app. The app talks to the Flex via Bluetooth, and when it\u2019s ready (a blue light appears on the camera), you push a synchronization button that sends data from the app to the camera (for changing the Wi-Fi network and password so the camera can talk with your Wi-Fi).<\/p>\n<p>The app did need a firmware update (it felt like it took longer than it should have), but while you\u2019re waiting the app asks you a bunch of questions to help set up the camera for its different modes. For example, under the \u201cAway\u201d mode setting, the app asks you whether you want to be notified on all motion or only when people\/pets are detected (or decide later). The \u201cHome\u201d setting lets you tell the app to record motion or \u201cdon\u2019t record anything\u201d while you\u2019re home (using the phone\u2019s GPS to determine whether you\u2019re at home or not). The third mode, \u201cNight\u201d lets you schedule the camera to notify you when motion is detected while you sleep. The mode of the camera can switch automatically when you leave the house (going from \u201chome\u201d to \u201caway\u201d, for example). A privacy mode lets you set the camera to completely turn off audio and video recording. A light goes on the device when it\u2019s recording, but it turns off when set to private mode, or when it\u2019s using battery power.<\/p>\n<p>With the camera updated and connected, you can watch video live \u2013 the camera also gives you a quick status update on your battery life and general strength of the Wi-Fi signal. In my first location test, I placed the camera in my dining room, equivalent to the \u201cLocation #2\u201d place for my Wi-Fi mesh reviews. It\u2019s a short hallway and room away from the location of the Wi-Fi router, and the app was indicating that I had a \u201cmedium\u201d signal strength. Interestingly, the camera can work on either the 2.4 GHz or 5 GHz frequency band (nice to see since a lot of older cameras only stream via 2.4GHz), but I still expected stronger strength than indicated.<\/p>\n<p>There doesn\u2019t appear to be the ability to adjust sensitivity on motion detection, other than the indicated \u201cpeople\/pets vs. all motion). My first alert had motion detected from rainwater rolling down the window during the March 14 blizzard. Other alerts showed me motion of cars driving by the house \u2013 there\u2019s no ability to tell the camera to only trigger alerts based on a specific area.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 tablet desktop\" id=\"\"\/>\n<h2><strong>Cloud storage options<\/strong><\/h2>\n<p>Canary offers free cloud access of recorded videos for up to four devices, with a 24-hour shared video history and unlimited data \/ downloads, but the time goes down for each device when you add more. For example, with two devices you get 12 hours of shared history, and with four devices you get a six-hour window of shared video. If you want to store videos for more than a day (or less), you need to pay &#8211; $9.99 per month for one device, $14.99 per month for 2-3 devices or $19.98 per month for four devices. The paid plans give you 30 days of shared video history storage, unlimited data\/downloads, a home deductible reimbursement of up to $1,000, incident support and a two-year extended device warranty. If you don\u2019t want to pay monthly, you can pay with a yearly plan at a discount.<\/p>\n<p><strong>Bottom line:<\/strong> While the flexibility of the Flex is an interesting option for video placement, both indoors and outdoors, the lack of interactive features on the app (motion-detection options, two-way audio, ability to save still images from live views) make this a less attractive option than some of the other cameras on the market. However, this is still a solid choice and the outstanding data security should make you feel a lot better about not being hacked or have the camera used in other attacks.<\/p>\n<p><strong>Grade:<\/strong> 4 stars (out of five).<\/p>\n<div class=\"end-note\" readability=\"5.9019607843137\">\n<div id=\"\" class=\"blx blxParticleendnote blxM2005 blox4_html blxC23909\" readability=\"28.666666666667\">Join the Network World communities on <a href=\"https:\/\/www.facebook.com\/NetworkWorld\/\" target=\"_blank\">Facebook<\/a> and <a href=\"https:\/\/www.linkedin.com\/company\/network-world\" target=\"_blank\">LinkedIn<\/a> to comment on topics that are top of mind.<\/div>\n<\/div>\n<p>READ MORE <a href=\"https:\/\/www.networkworld.com\/article\/3183582\/consumer-electronics\/review-canary-flex-security-camera-lives-up-to-its-name.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\nCanary\u2019s initial foray into the networked home security camera space was very impressive \u2013 my colleague David Newman touted its high security settings in the wake of revelations about the general insecurity of these types of devices. The Canary camera was also somewhat large \u2013 a cylindrical tower that took up some significant space on your desk, cabinet or shelf.The latest camera the company sent me is the Canary Flex, a much smaller unit meant to be more flexible (hence the name) in terms of placement, but also in power options. Like the Arlo Pro camera, the Canary Flex is powered by an internal battery (it\u2019s charged via USB cable and power adapter). This means you can move the Flex to a location inside or outside your home where there\u2019s no power outlet. The Flex comes with wall mounting screws and a 360-degree magnetic stand so you can position the camera in different spots. Additional accessories, such as a plant mount or twist mount (pictured below), offer even more location choices.To read this article in full, please click here READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":1833,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[906,376,307],"class_list":["post-1832","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-consumer-electronics","tag-internet-of-things","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Review: Canary Flex security camera lives up to its name 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/review-canary-flex-security-camera-lives-up-to-its-name\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Review: Canary Flex security camera lives up to its name 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/review-canary-flex-security-camera-lives-up-to-its-name\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2017-03-24T13:01:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/review-canary-flex-security-camera-lives-up-to-its-name.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"467\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/review-canary-flex-security-camera-lives-up-to-its-name\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/review-canary-flex-security-camera-lives-up-to-its-name\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Review: Canary Flex security camera lives up to its name\",\"datePublished\":\"2017-03-24T13:01:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/review-canary-flex-security-camera-lives-up-to-its-name\\\/\"},\"wordCount\":1094,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/review-canary-flex-security-camera-lives-up-to-its-name\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/review-canary-flex-security-camera-lives-up-to-its-name.jpg\",\"keywords\":[\"Consumer Electronics\",\"Internet of Things\",\"Security\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/review-canary-flex-security-camera-lives-up-to-its-name\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/review-canary-flex-security-camera-lives-up-to-its-name\\\/\",\"name\":\"Review: Canary Flex security camera lives up to its name 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/review-canary-flex-security-camera-lives-up-to-its-name\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/review-canary-flex-security-camera-lives-up-to-its-name\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/review-canary-flex-security-camera-lives-up-to-its-name.jpg\",\"datePublished\":\"2017-03-24T13:01:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/review-canary-flex-security-camera-lives-up-to-its-name\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/review-canary-flex-security-camera-lives-up-to-its-name\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/review-canary-flex-security-camera-lives-up-to-its-name\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/review-canary-flex-security-camera-lives-up-to-its-name.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/review-canary-flex-security-camera-lives-up-to-its-name.jpg\",\"width\":700,\"height\":467},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/review-canary-flex-security-camera-lives-up-to-its-name\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Consumer Electronics\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/consumer-electronics\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Review: Canary Flex security camera lives up to its name\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Review: Canary Flex security camera lives up to its name 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/review-canary-flex-security-camera-lives-up-to-its-name\/","og_locale":"en_US","og_type":"article","og_title":"Review: Canary Flex security camera lives up to its name 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/review-canary-flex-security-camera-lives-up-to-its-name\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2017-03-24T13:01:00+00:00","og_image":[{"width":700,"height":467,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/review-canary-flex-security-camera-lives-up-to-its-name.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/review-canary-flex-security-camera-lives-up-to-its-name\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/review-canary-flex-security-camera-lives-up-to-its-name\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Review: Canary Flex security camera lives up to its name","datePublished":"2017-03-24T13:01:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/review-canary-flex-security-camera-lives-up-to-its-name\/"},"wordCount":1094,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/review-canary-flex-security-camera-lives-up-to-its-name\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/review-canary-flex-security-camera-lives-up-to-its-name.jpg","keywords":["Consumer Electronics","Internet of Things","Security"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/review-canary-flex-security-camera-lives-up-to-its-name\/","url":"https:\/\/www.threatshub.org\/blog\/review-canary-flex-security-camera-lives-up-to-its-name\/","name":"Review: Canary Flex security camera lives up to its name 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/review-canary-flex-security-camera-lives-up-to-its-name\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/review-canary-flex-security-camera-lives-up-to-its-name\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/review-canary-flex-security-camera-lives-up-to-its-name.jpg","datePublished":"2017-03-24T13:01:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/review-canary-flex-security-camera-lives-up-to-its-name\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/review-canary-flex-security-camera-lives-up-to-its-name\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/review-canary-flex-security-camera-lives-up-to-its-name\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/review-canary-flex-security-camera-lives-up-to-its-name.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/review-canary-flex-security-camera-lives-up-to-its-name.jpg","width":700,"height":467},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/review-canary-flex-security-camera-lives-up-to-its-name\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Consumer Electronics","item":"https:\/\/www.threatshub.org\/blog\/tag\/consumer-electronics\/"},{"@type":"ListItem","position":3,"name":"Review: Canary Flex security camera lives up to its name"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/1832","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=1832"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/1832\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/1833"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=1832"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=1832"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=1832"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}