Major iOS 7 Security Flaw Revealed as iPhone 5s & iPhone 5C Launch

iOS 7 Security Passcode

A security flaw allows anyone to access to photos and videos stored on iPhones running iOS 7, even with passcode lock enabled. With a few taps and swipes, anyone can access the iPhone’s camera roll and do what they wish with the contents. The iOS 7 security flaw also allows anyone to browse which apps […]

iPhone 5s Touch ID Stores Biometric Data, Not Fingerprint

finger5s

Given government-sanctioned NSA spying, breaches in security through hacking and malware, and privacy concerns in recent years, there have concerns about the Touch ID technology that Apple had introduced alongside the iPhone 5s earlier this week. Touch ID allows the iPhone 5s to authenticate users to quickly unlock the iPhone and authorize purchase transactions on […]

With the Rise of Malware, Your Dumb Home May Be Safer Than a Smart Home

ome_-_Hacking_Z-Wave_Home_Automation_Systems

With the allure of simplifying your life by connecting your home to the Internet–with things like smart appliances, digital door locks, remotely accessible security cameras, and the ability to monitor and shut off your water or electricity from anywhere there is Internet connectivity–users should consider the unintended consequences of hacking. As consumers begin eyeing adding […]

Sprint Update Secures Your Galaxy S4, Allows for More Storage [Updated]

img_knox_02

A new over-the-air, or OTA, software update for the flagship Galaxy S4 by Samsung on Sprint brings a number of new features. For one, the software update will make your Galaxy S4 more secure, which will bring joy to IT administrators. Update: Following our post, Samsung Mobile had reached out to us saying that Knox isn’t […]

Ford Talks Connected Cars, the Cloud and Data Security

DSC_0074

During the Ford Trends conference, Jim Buczkowski, Henry Ford Technical Fellow and director of Electrical and Electronics Systems, discussed the future of connected automobiles and storing data in the cloud. As part of the Evos concept, the vehicle will learn driving habits, routes, and even music preferences. In the current age of governments and companies […]

DuckDuckGo vs. Google Search

DuckDuckGo vs Google (3)

For millions, privacy on the internet is a major concern. For these people, how much information an online company is collecting about them is important, and so is what companies do with their information. For a long time, these users were looked at by technology companies as outliers, people who were vocal yes, but very […]

Apple’s Default iPhone Hotspot Password Easy to Crack

iphone5

A group of researchers in Germany found that it’s incredibly easy to predict the default passwords iOS generates for mobile hotspots on the iPhone and iPad. According to a recently published paper the researchers from University of Erlangen found that Apple uses an open-source Scrabble dictionary and a few random numbers to generate hotspot passwords for […]

What iPhone Thieves Will See After the iOS 7 Release

IOS 7 Security - prevent iPhone theft

Apple announced a new iOS 7 feature design to stop iPhone theft by locking the iPhone and iPad to a user account. This isn’t the kill switch that police and legislators called for, but it is a good start to discouraging iPhone theft. iOS 7 will now ask if a computer should be trusted when […]

Will iOS 7′s Security Focus Continue for the iPhone 5S?

safari_passwords_screen

Though Apple’s security-centric iOS 7 demo at WWDC yesterday may have been overshadowed by the glitzy, yet simple new UI and other more consumer-friendly features like iTunes Radio and a new multitasking experience, security is very much a big feature for the iPhone-maker. In the past, it was rumored that the “S” in the iPhone […]

5 Reasons to Use a Virtual Private Network (VPN)

VPN internet lock (stock photo)

The Guardian recently revealed that a top secret government program was collecting metadata from Verizon as a way to link terrorists to each other. This collection is without oversight and does not target any particular individual. It also includes metadata of United States citizens call data. Then it was revealed that all the phone carriers in […]

Hackers Take Control of Vehicle Door Locks Remotely

Keyless Entry Hack

Automotive electronics are becoming quite advanced. In the past, each electrical component of a vehicle would operate independently of the other systems. In modern vehicles, manufacturers utilize CAN bus (Controller Area Network) to allow each computer component to be able to talk to each other. This technology allows for state-of-the-art infotainment systems, radar cruise control […]

NSA, PRISM, Digital Records: Are Americans Delusional in Thinking They Are Entitled to Privacy?

PRISMbriefingS2HApr2013_v1_0.pptx

After the UK’s Guardian broke that the National Security Agency, or the NSA, in the U.S. had compelled telecom provider Verizon Communications to comply in releasing the telephone records of millions of Americans, public outrage began mounting. Shortly after that news broke, the Wall Street Journal had reported that Verizon isn’t alone in its “Share Everything” plan with […]

Will Facial Gesture Unlocking Give You the Right to Act Weird in Public?

45-Free-Tongue-Out-Smiley

Google had debuted a key security feature called Face Unlock on the Android 4.0 software release, but users eventually found out that holding a picture of the owner’s phone up to the device’s front-facing camera would unlock the device, supplanting the security benefits. At its core, however, Face Unlock does offer a lot of potential, […]

How to Setup Two-Step Authentication on Twitter

Twitter Two-Step Authentication Five

After spending most of last fall and early spring defending its users from attacks by hackers who looked to exploit the ubiquity of Twitter’s login functions and turn users online persona’s against them, Twitter is now stepping up to the plate.. This week the social networking service, became the latest company to add support for […]

Google: Users are Still Tech’s Largest Security Flaw

security-breach

Members of Google’s security team believe that the company’s biggest security challenges still revolve around users themselves. That’s according to statements made by two of Google’s security experts and documented by CNET at Google I/O this past week. Eran Feigenbaum, the director of security for Google Apps, believes that users can help Google protect their […]

Congress Wants Privacy Issues Addressed With Google Glass

gg3

Eight Congressmen on the Bipartisan Congressional Privacy Caucus have sent a letter to Google asking the Internet search giant to address privacy concerns and questions surrounding the use of Google Glass by June 14th. Congress wants to know how Google will address privacy issues for users and owners of Google Glass, as well as for […]