Security

K5 Autonomous Data Machine Prevents and Even Predicts Crime

December 4, 2013, By Fred Hoot
Knightscope K5 robot at mall

Wouldn’t it be great to own your own Machine as depicted on the TV show Person of Interest? It would be very helpful to now who was going to commit a crime before it happens. Dream on, you say, but would it surprise you that such capabilities could be available in the very near future? […]

Privacy a Major Concern for Teens, Of Course

August 26, 2013, By Sanjeev Ramachandran
mobile

There is a myth about the current generation of teenagers that they are willing to share any information on social networks. But the truth is different. A recent research suggests that teens are extremely concerned about privacy issues. The research conducted by Pew Research Center’s Internet and American Life reveals that one in four teenagers have […]

Lost Your Android Phone? Try These steps to Secure Your Devices

August 24, 2013, By Sanjeev Ramachandran
Android

No one among you could afford losing your mobile phone, be it an Android or Apple device. With the introduction of smart apps and features, a cell phone is not just a device for making phone calls anymore. It also acts as a wallet, a diary, a photo album, a gaming machine and even as […]

Electronic Billboards Susceptible to Hacking

March 14, 2013, By Sanjeev Ramachandran
billboard

When the advertising world replaced the old printed billboards with LCD and LED units that can change the ads without much hassle they must not have bargained for this. It appears now that the LCD and LED boards are as susceptible to hacking as your PC, going by what happened to a billboard in Serbia […]

Fingerprint ATMs Now Safe; Blood Flow in Fingers Can be Monitored

February 25, 2013, By Sanjeev Ramachandran
fpscan

ATMs were actually a revolution in the money transaction terrain, and we have seen so many add-ons to this technology. The most innovative add-on was the fingerprint reader that made us leave our apartments with no need to carry ATM cards at all. As every coin has two sides, perverted minds began thinking of cutting […]

NYPD Special Division to Recover Stolen Apple Devices

February 25, 2013, By Sanjeev Ramachandran
NYPD

Looking at the NYPD, you can easily see that these guys have put up a team for almost all types of crimes ranging from pick pocketing to multiple homicides. With the number of cases filed in regard with stolen Apple devices on the rise, NYPD has decided to launch a team specifically to track missing […]

App Developers Do Know Where You Live, and More

February 16, 2013, By Sanjeev Ramachandran
google-play

People who don’t have an Android phone are becoming rare these days. It looks like almost everyone owns an Android phone. They download lots of apps and whether they use it or not, they keep on downloading them again and again. It seemed to pose no threats and people seemed to think more the apps, […]

Cybercrime Gang Busted in Spain

February 14, 2013, By Sanjeev Ramachandran
sp-Europol

A multinational gang of cyber criminals have been busted by the Spanish authorities in the Costa del Sol of Spain. Europol, the European police agency has registered the arrest of ten members of the gang who were operating from the Mediterranean cities of Torremolinos and Benalmadena. The arrest came close on the heels of the […]

Adobe Outs 2 Emergency Security Patches for Flash; Zero Day Threats Mitigated

February 9, 2013, By Sanjeev Ramachandran
adobe.logo

Adobe has just issued a patch for critical ‘so-called’ vulnerabilities in Flash Player that are currently being exploited by unknown hackers. The targets were the Adobe users of Windows and Mac OS X. The unscheduled patch fixes up bugs that were being used in attacks designed to trick users into downloading ambiguous Word documents containing […]

Cyber Command Staff to Increase Staff in Coming Weeks: Pentagon

January 29, 2013, By Sanjeev Ramachandran
Pentagon USA

The Pentagon has been among discussions to empower the Cyber Command and it looks like they have decided to pump up the number of employees on a massive scale. Located in Fort Meade, United States Cyber Command (USCYBERCOM) is an armed forces sub-unified command subordinate to United States Strategic Command. The command is charged with pulling […]

Grammatically Correct Passwords are More Prone to be Hacked

January 19, 2013, By Sanjeev Ramachandran
password

During the formative years of the web, passwords worked pretty well. This was due largely to how little data they actually needed to protect. Our passwords were limited to a handful of applications: an ISP for email and maybe an E-Commerce site or two. But this is not the case right now. We use passwords […]

Microsoft Alerts Zero Day Attack; Discloses Patch to Solve Issue

January 1, 2013, By Sanjeev Ramachandran
internetexplorersecurity

On 29th December, Microsoft confirmed that their IE 6, 7 and 8 will most probably be the target of zero-day vulnerability that is being used by attackers to hijack victims’ Windows computers. MS assured that they will dedicate themselves to release the patch asap. Fortunately, they have come up a patch and therefore the new […]

Page 1 of 612345...Last »
© 2008-2012 DeviceMag.com - All rights reserved | Privacy Policy