Decision time? Check out our latest product comparisons

Security

Google's new USB Security Key provides a secure and convenient means of two-factor authent...

There's an increasing recognition that passwords alone are not going be an adequate form of online security in the future. Two-factor authentication can vastly improve security, by simply introducing a second means of verification alongside a password. Google's new USB Security Key does just that.  Read More

The Plastc Card features an e-ink screen and a rewritable magnetic strip

Tired of digging through the collection of credit, debit and loyalty cards in your wallet? Well, if you are, then you're the sort of person who might like the Plastc Card. It's a new electronic card-format device, that can store the information for up to 20 other cards on it at once. You just select the card that you want to access via the e-ink screen, then use Plastc as if it were that card.  Read More

The SecureDrives Autothysis128t SSD has the ability to self-destruct when triggered via te...

A misplaced storage device could lead to the leaking of a few embarrassing photos for some, while for those dealing in confidential information there might be a whole lot more at stake. Enter these self-destructing hard drives from London-based data security specialists SecureDrives, which appear ordinary storage devices on the surface but are capable of destroying onboard data when triggered by a simple SMS message.  Read More

The Rico uses a spare smartphone as its brain and eyes

Almost every day, it seems, breakfast is accompanied by the debut of a next generation smartphone that makes our perfectly capable current models look positively antiquated. Whether you patiently wait for the end of your contract before upgrading or contact your provider straight away, you're existing pocket pal will likely be retired to a powered off eternity in an infrequently opened drawer somewhere. The folks over at Mindhelix want to give that old phone a new lease of life in the Rico home security and monitoring system.  Read More

Seek Thermal for iOS

Ever wonder if there’s something hiding in the bushes at night or if your door seals are leaking heat in the winter? A thermal imaging camera is one way of answering these questions, but they tend to be bulky and very pricey. California-based Seek Thermal is aiming to bring thermal imaging into the consumer realm with its small, relatively affordable thermal camera smartphone accessory.  Read More

Quick Caps make it impossible to pull open a bike's quick-release wheel levers – without t...

While quick-release hubs certainly make it easier for cyclists to remove and reinstall their wheels when doing things like fixing flats, they also make it very easy to steal those same wheels. As a result, riders typically have to remove the front wheel when locking up their bike, or run a secondary cable lock from it to the main U-lock. Quick Caps, however, are designed to make doing so unnecessary – they're little padlocks for the quick-release levers.  Read More

Free or inexpensive apps to secure your mobile communications (Image: Shutterstock)

Mobile phone users are becoming more savvy to the potential security risks of standard, unencrypted text messaging and wary of government intrusion into everyday communications. Some consumers require encrypted phone calls for information-sensitive business requirements and others just don't like the idea of others prying into their personal lives. Gizmag takes a look at a sampling of the apps available for iOS and Android (and sometimes desktop) to encrypt mobile communications, both text messaging and phone calls.  Read More

Here's how a few tips on how to keep your data in the cloud private and secure

Whether you like it or not, a lot of your data is probably being stored in the cloud, and that's a trend that's not going to stop. While it is convenient to have your data available from virtually everywhere, it's also prone to security vulnerabilities. Here are some tips on how to keep your cloud-based data private and secure.  Read More

ZEBRA matches keyboard and mouse input with movement data transmitted by an electronic bra...

There are already a variety of technologies for verifying a computer user's identity when they attempt to access sensitive data ... data such as patients' health records on hospital computer systems. The problem is, those users may sometimes forget to log off when they're done, or they may temporarily leave their computer unguarded when leaving their desk. That's why Dartmouth College computer science student Shrirang Mare is developing ZEBRA. It utilizes a sensor-equipped bracelet to continuously authenticate a user's identity.  Read More

The Seatylock folds out to a total length of one meter (3.2 feet)

If you're using your bike just to go meet someone at the coffee shop, it's a hassle to have to bring along a backpack, just to carry your lock. You could get a lock-mounting bracket installed on your frame, but the Seatylock presents an interesting alternative – as its name suggests, it's a bike seat that can be removed to serve as a lock.  Read More

Looking for something? Search our 29,042 articles