Ransomware scams are nothing new to computer users; one one making the rounds attempts to disguise itself as an FBI cybercrime intervention for suspected nefarious activity. If you get stung by this scam (generally the fastest way is by using underground pirated software search engines and pornographic sites that redirect to the scam page, but even innocent image searches will get you there if you're not careful), the site will present a notice claiming to come from the FBI "Cyber Department." It states that the system's browser has been seized and recorded, and that the user … Read more
If you have a hammer, everything looks like a nail. If you have a "Drone it Yourself" kit, everything looks like a drone. Jasper van Loenen created the "Drone it Yourself" kit as a portable way to turn regular items into flying machines.
The kit components fit snugly into a large silver briefcase, the kind you would expect a secret agent to have handcuffed to his wrist. It contains everything you need to get an object to fly, so long as that object is light enough to get up in the air and has enough attachment points for all the gear.… Read more
When it comes to evaluating fingerprints, not everyone has the keen eye of Sherlock Holmes. In fact, the human eye has proven to be subjective -- and thus not fully reliable -- when it comes to determining the mere quality of the print.
So researchers at Penn State are hoping to remove that subjectivity with the merging of three inexpensive computer programs that grade that quality -- which can be affected by all sorts of environmental weathering and smudging -- on a scale of 0 to 100.… Read more
Two-step verification can help thwart malicious attacks against your online accounts. Anyone trying to break into your account would need both your password and the mobile device that authentication codes are sent to in order to gain access.
Google has done a splendid job of providing options for those who are interested in setting up this extra security measure: you can get text alerts, or you can use Google's authenticator app, available for Android, BlackBerry, and iOS.
When using the app as your method of authentication code delivery, you may wonder what happens when you want to retire an … Read more
Do you really wish you had X-ray vision? Sure, it would be fun to see what your neighbors are doing behind those walls -- until you see something you wish you hadn't.
Regardless, researchers at MIT have developed a sensing technology that uses low-power Wi-Fi to detect moving people. It follows other wall-penetrating sensor tech using radar and heavy equipment.
The Wi-Vi system by Dina Katabi and Fadel Adib sends out a low-power Wi-Fi signal and tracks its reflections to sense people moving around, even if they're in closed rooms or behind walls. … Read more
If the government's PRISM program has you looking over your shoulder, perhaps you'll find yourself a little less paranoid with DuckDuckGo Search & Stories on your phone. The app was released today for iPhone and for Android.
DuckDuckGo lets you search anonymously. Unlike other search engines, it does not collect or share your personal information. Thus, should the feds request user information from DuckDuckGo, it'll have nothing to turn over.
I tried out the iPhone app and was surprised to find it's more than a simple search app. It's a blend of search and news. … Read more
SHANGHAI, China -- FingerQ, a company based in Hong Kong, has made a series of Android cases that come with biometric fingerprint sensors for added security. The sensors don't replace the built-in security features of your Android phone (unlocking your smartphone still uses the passcode or pattern unlock), but adds another layer of protection for chats and applications.
The FingerQ system will be available as an accessory called the PrivacQ case and caters to phones such as the Samsung Galaxy S3, S4, and Note 2, as well as the HTC One. The fingerprint sensor is just one part of the equation, as the company's software also needs to be installed on the handset for the system to work. … Read more
With this version comes the debut of Norton Mobile Insights, the byproduct of a massive endeavor to analyze over 4 million popular apps across various app stores to determine whether an app puts users' personal data at risk. "The issue of privacy is a complex and evolving one, for both consumers and developers," said Con Mallon, Symantec's Senior Director and product manager. Mallon believes that users are starting … Read more
Today, Bitdefender released the 2014 version of its flagship Bitdefender Total Security product, replete with an interface redesign, adaptive technology, and noticeably absent version-number attribution.
With this year's release of Total Security comes the debut of Bitdefender Photon, an adaptive technology that aims to optimize the speed and performance of your PC as it adjusts to your computer.
Photon was actually introduced earlier in Bitdefender 2013, but since then the company has made major improvements while minimally impacting performance. Now, Photon officially becomes its own product component.
Bitdefender Total Security also introduces an online credential aid called Wallet. Not … Read more
A couple of months ago we reviewed the beta version of the surprisingly convenient online password manager from PasswordBox.com. On Tuesday, Dan Robichaud, CEO of PasswordBox, has just announced the official release of PasswordBox and introduced some new features as well as the mobile app releases for iOS and Android.
PasswordBox lets you perform one-click log-in to all of your favorite sites from previously stored accounts. Just download the client, which is available as an add-on/extension for IE, Firefox, Chrome, and Safari. Create a PasswordBox.com account and Master Password and you're ready to go. You can … Read more