Introducing the Gizmag Store

Security

With data privacy becoming a bigger concern, Blackphone presents itself as a secure option...

While news of smartphone hacks, data sniffing, and government intrusion has regrettably become commonplace, it’s also had the consequence of raising public awareness of privacy risks which used to be solely the domain of security geeks. In this climate of readiness, Blackphone is launching a smartphone it says will be both secure and user-friendly, developed as a partnership between founders of the encryption firm Silent Circle and phone manufacturer Geeksphone.  Read More

Audi's A8 L Security, with AWD, is offered with a choice of a twin-turbocharged 4.0 liter ...

From the street, Audi’s A8 L Security Sedan looks like any other no-nonsense vehicle out of Germany. Professionally serious with sedate, yet luxurious design elements, the A8 L Security is anything but flashy. However, upon closer inspection the new 500-hp luxury bulletproof sedan is anything but your average grocery getter.  Read More

Apple’s iCloud Keychain keeps passwords synced across iOS 7 devices and OS X Mavericks

Apple’s iCloud Keychain feature is the company's attempt to make a basic level of password management available in its iOS 7 mobile OS. It’s a convenient feature that keeps your account names, passwords, and credit card numbers stored in iCloud. Here's a look at what it is and how to use it.  Read More

Coming soon?

Samsung is working with iris-scanning security technology and could include such an eye scanner in the next iteration of its Android flagship smartphone, the Galaxy S5, according to what a company executive said in an interview at CES 2014 this week.  Read More

Here are some essential tips for securing your iPad or iPhone running on iOS 7

As their power increases, we're storing more and more of our important and personal data on our mobile devices. That's why it's of paramount importance that we make sure they're as secure from prying eyes as possible. Thankfully, iOS 7 has improved security features designed for just that. If you're the proud owner of an iPhone 4 or later, iPad 2 or later, iPad mini or 5th-gen iPod touch, here are some simple tips you can use to improve the chances your valuable data won't fall into the wrong hands.  Read More

Computer scientists have successfully transmitted data between laptop computers using only...

It could be assumed that the most effective way to safeguard your computer against the threat of cyber attacks would be to disconnect it from all networks: wireless, LAN, network cards or the internet. However, research from the Fraunhofer Institute for Communication, Information Processing and Ergonomics (FKIE) has demonstrated a malware prototype with the ability to jump the "air gap" – meaning even that once surefire security measure might not be enough to ensure the protection of your computer.  Read More

SkyJack was made from a Parrot AR.Drone 2.0 like the one pictured here

Amazon's Prime Air announcement last week brought concerns about the use of commercial drones to the fore, but one programmer may have just muddied the waters even more. Notable hacker Samy Kamkar recently modified a Parrot AR.Drone 2 with his custom software, called SkyJack, allowing it to seek out the wireless signals of other UAVs and take control of them, even while in flight.  Read More

The Next Gen Bike Rack is claimed to secure all components of a bicycle, using a single U-...

Have you ever noticed how sometimes even if there are slots available in a bike parking rack, some people will instead choose to lock their bike to a parking meter or sign post? This is because those racks aren't really conducive to securing the frame and both wheels, using a single U-lock. Montreal inventor Peter Krantz, however, has designed a rack that is.  Read More

The Lock8, in place and in use

With a regular bicycle lock, you secure it to your bike when you park, then just hope that everything will still be intact when you get back. Such is not the case with the bike-mounted Lock8, however. If anyone tries monkeying with it, a high-pitched alarm will sound, and you will be instantly notified on your smartphone. Should the thief proceed to steal the bike, you can use your phone to track its whereabouts.  Read More

But it may be premature to declare CAPTCHA technology dead (Photo: Maen Zayyad/Shutterstoc...

San Francisco-based artificial intelligence startup Vicarious has announced that it has developed software algorithms which can solve CAPTCHAs up to 90 percent of the time. Though CAPTCHAs are any automated test which differentiates between humans and computers, they often take the form of strings of partly distorted letters and numbers which many websites use to check that a visitor is human, the idea being that a computer cannot read the disguised text while a human (hopefully) can. It’s this type of CAPTCHA that Vicarious’s algorithms are designed to beat, and the high success rate renders the current standard of text-based CAPTCHAs ineffective, the company claims.  Read More

Looking for something? Search our 26,469 articles