Shopping? Check out our latest product comparisons

Security

The Moto Skip, assuming it reappears on Motorola's website, will let you unlock your Moto ...

A passcode or pattern lock is a great way to keep your phone secure, but they can be a bit of a hassle. Motorola Skip is a new accessory that uses NFC to bypass the pesky part of securing your phone.  Read More

DefCon and Black Hat highlight the fact that companies often seem more concerned about the...

The cyber security convention DefCon and its corporate counterpart, Black Hat, that are held annually in Las Vegas present a unique tableau where the traditional (and traditionally overstated) conflict between underground hacking culture and corporate and government security professionals is suspended with the goal of openness and education. If you enjoy and own technology and gadgets of any kind, the conferences highlight a looming security crossroads that affects every layperson. Gizmag takes a look at some of the more important hacks from this year.  Read More

CreepyDOL is a new personal tracking system that allows a user to track, locate, and break...

Brendan O'Connor is an unabashed hacker who has worked for DARPA and taught at the US military's cybersecurity school. CreepyDOL (Creepy Distributed Object Locator), his new personal tracking system, allows a user to track, locate, and break into an individual's smartphone. "For a few hundred dollars," he says, "I can track your every movement, activity, and interaction, until I find whatever it takes to blackmail you."  Read More

The Canary security system is controlled by a smartphone app

According to the US Justice Department, people who live in rented homes are more likely to be burgled. In part, this is may be because flat dwellers aren't generally allowed to install security systems. As an alternative to teaching the hamster to bark, the Canary aims to put a complete security system into a self-contained, plug-and-play container that can be controlled by a smartphone app.  Read More

The Recordura electronic door lock runs purely on electricity generated by users pushing o...

Smartphone-enabled electronic door locks such as the Unikey, Lockitron and Goji do have advantages over their traditional counterparts – digital “keys” can be sent to multiple users’ phones, access to locked rooms can be limited to specific dates and/or times for certain users, and keys stored on lost phones can simply be deactivated. However, as with just about any electronic version of a purely-mechanical device, they do introduce one complicating factor: they require a power supply. The Recordura lock, however, generates its own electricity when users push on its handle.  Read More

The myIDkey voice-searchable USB drive for password management

Password manager programs allow users to store all their personal login information behind one master password. Now, a product called myIDkey is looking to make that process portable. It's a fingerprint-encrypted, voice-searchable thumb drive that stores all of a user's passwords and private data.  Read More

Applied DNA Sciences (ADNAS) has developed a new approach to solve crimes using DNA taggin...

Applied DNA Sciences (ADNAS) has developed a new approach to solve crimes using DNA tagging. The difference is that instead of tagging the objects being stolen, the company's system tags the perpetrator with DNA. While this has been tried before by applying the DNA to a fleeing criminal with a gun, ADNAS has adopted a more subtle approach.  Read More

Prof. William Dichtel and Deepti Gopalakrishnan with samples of the polymer

Detecting bombs in places such as airports could be getting easier, thanks to a new fluorescing polymer. While you might expect the material to glow in the presence of explosives, they actually cause it to stop glowing.  Read More

In a series of bombshell leaks, the extent of the US government's alleged spying on Americ...

If there was any doubt that George Orwell's Nineteen Eighty-Four was a prophetic piece of fiction, you can pretty much put that to rest. The more skeptical among us have claimed for years that, in the age of the internet, nobody has real privacy. During the last 24 hours, those fears emerged from the shadows. Details leaked of the secret US National Security Agency (NSA) program called PRISM, which may as well have been called Big Brother.  Read More

The Goji Smart Lock is controlled by a smartphone and automatically sends the owner an ema...

The days of mechanical locks may be numbered as Wi-Fi- and Bluetooth-enabled smart locks continue to evolve with devices such as the Lockitron and August Smart Lock turning a smartphone into a wireless key. Unlocking a door with a smartphone from anywhere in the world is convenient by itself, but with the Goji Smart Lock you can instantly know when someone opens your front door and even see who it is.  Read More

Looking for something? Search our 27,903 articles