12/04/2013, Just how good is the security of your computer? Do you have really, really strong passwords, so much so that it is virtually impossible to crack them even with brute force computing? Well, you know what they say about security – a chain is only as strong as its weakest link. In one of the more recent security snafus to date, more than two million passwords have been posted online […]
09/05/2013, As it stands the security on our mobile phones isn’t as tight as it should be. There are ways for hackers to bypass the lock screen, and for those who don’t bother with a passcode, well, your information is pretty much open to anyone who gains possession of your phone.
09/03/2013, A few months ago, we published a story where Motorola was considering using tattoos or pills to be used in order to allow a person to become a walking password of sorts. The tattoo or pill would allow the person to authenticate themselves with their device, whether it be a computer or mobile device. If you’re the kind of person who would prefer not to be tatted up or digest a […]
08/29/2013, According to our earlier report, the US government has found in a study of their own that about 80% of malware targets the Android operating system, about 0.7% for iOS, and 0.3% for Windows Mobile. Given that the Windows Phone operating system is not as popular compared to Android, we guess malware creators don’t see a need to target the operating system, yet, but we expect a day will come […]
08/26/2013, Right now, you can say that 100% of the bodyguards that heads of state as well as celebrities and anyone who deem themselves to be important enough to be protected, tend to be human, as I have yet to see an alien lifeform play the role of a bodyguard. The thing is, a future where a robot would take the place of a human bodyguard does sound rather unnerving, and […]
08/20/2013, There is an old Malay proverb that goes something like this after translation – no matter how high up a squirrel scurries, it will still fall down to the earth eventually. I guess that would be the most apt way of describing parking meter mechanic James Bagarozzo who has gotten away with approximately 10,000 pounds (in weight, not the British currency) worth of quarters when he was working as a […]
08/07/2013, Your personal information is definitely very precious to you, which is why you should take all the possible and necessary steps to prevent any kind of personal information from getting stolen or abused. Passwords are one sensitive area which we have had to talk about in recent memory, and unfortunately for those who use Google’s Chrome web browser, you run the danger of having your user passwords exposed, “courtesy” of […]
08/06/2013, So, you think that you have got a pretty clever password that hackers would find it difficult to crack? Perhaps you might be right, but make sure that your strong password is not betrayed by “incompetent” hardware. Microsoft has just issued a warning to IT departments to ensure that their Wi-Fi networks are well secured, right after it was discovered that a security vulnerability in Windows Phones itself will leak […]
07/22/2013, Now here is a robot that snooping boyfriends or curious ex-wives would like to have – on that can crack a smartphone’s security code in under 24 hours. Of course, when you look at it on the surface, this is no great achievement, cracking a smartphone’s four digit PIN code. All you need is plenty of patience and persistence in trying out all 10,000 combinations or so. Hackers, however, have […]
07/15/2013, In order to prevent or reduce the risk of security leaks, the Kremlin has allotted around $14,900 to purchase electric typewriters for documentation purposes.
07/09/2013, Remember the other day we reported that a security firm had discovered a four year old vulnerability in Android that could potentially affect up to 99% of Android devices out there? Well the good news is that Google wasted no time in fixing it and according to Gina Scigliano, Google’s Android Communications Manager, it seems that it has been confirmed that Google has since provided a patch to their partners, […]
06/17/2013, Ever since the PRISM scandal (a government program deemed legal that collects digital information for security purposes) exploded in the media, public-facing companies like Facebook, Apple, Google and Microsoft have been on the defensive in terms of public relations since they are at the forefront of the public’s reaction (if not anger). The original story was that the government security agencies had “direct access” to the companies servers. All of […]
06/12/2013, One of the cool features of iOS 7 is the activation lock which is one of the features Apple introduced in iOS 7. This will prevent thieves of stolen phone from reselling the device, especially since the handset is pretty much a dud unless the owner reactivates it with their Apple ID and password. This is one of the steps that Apple is taking to help prevent smartphone theft, apart […]
05/10/2013, If you haven’t figured out how you’re going to show mom how much you care, it’s not too late. Emails from brands you trust and the Web can help you shop, ship and rest easy knowing that your gift will arrive on time – all without having to leave your computer. But Mother’s Day is also a great time for cybercriminals to use your email inbox to conduct phishing scams, […]