Shopping? Check out our latest product comparisons

Security

Hackers demonstrate a workaround to Apple's touted Touch ID system (photo from Starbug's v...

Hackers claim to have already found a workaround to the iPhone 5s' Touch ID system, allowing them to unlock the phone with a dummy fingerprint obtained from a real fingerprint.  Read More

Do you connect safely? (Photo: unten44)

Conscious that injudiciously inserting one's USB charger into just any old public port might expose one's handheld device to any manner of nasty malware (or data theft, for that matter), experimental security outfit int3.cc has come up with the USBCondom, a go-between device that creates a break between the data pins of your USB connector and those of the public USB port you're plugging into. The power connection is maintained, however, allowing you to charge your smartphone or what-have-you in a state of graceful equanimity.  Read More

The Nymi bracelet uses the wearers EKG for identification

If someone says that they want to steal your heart, be careful. They may be trying to get into your computer files. The Toronto-based biometrics company Bionym wants to replace old-fashioned passwords with Nymi; a bracelet that uses the wearer’s heartbeat in place of passwords. According to the developers, the system delivers a secure and convenient means of identification that also provides the potential to control devices using gestures.  Read More

Caja Oscura was completed in 2012 (Photo: Pedro Kok)

Paraguayan home Caja Oscura, by local architects Javier Corvalán and Laboratorio de Arquitectura, consists of a basement structure, with a manually-operated tilting metal box placed atop. With no natural light available when the box is closed, this unusual dwelling is probably not suitable for those who fear being trapped in a small enclosed space, but it is arguably the perfect place to ride out the Apocalypse ...  Read More

The HelmMate – it's like a helmet-storing umbrella for your saddle

A new product known as the HelmMate is designed to take care of a couple of common bicycle commuters’ complaints – even if they’re relatively small ones. It lets cyclists stow their helmet on their parked bike instead of having to carry it around, plus it keeps the saddle from getting rained on.  Read More

Is your data is safe on open public WiFi? (Photo: Shutterstock)

There are plenty of opportunities to connect to public Wi-Fi hotspots when you're on the go these days. Coffee shops, hotels, restaurants and airports are just some of the places where you can jump online, but often these networks are open and not secure. Whether you're using a laptop, tablet or smartphone, you'll want to connect your device securely to protect your data as much as possible. Here's some simple steps you can take to help make sure your data is safe on open public Wi-Fi.  Read More

The Moto Skip, assuming it reappears on Motorola's website, will let you unlock your Moto ...

A passcode or pattern lock is a great way to keep your phone secure, but they can be a bit of a hassle. Motorola Skip is a new accessory that uses NFC to bypass the pesky part of securing your phone.  Read More

DefCon and Black Hat highlight the fact that companies often seem more concerned about the...

The cyber security convention DefCon and its corporate counterpart, Black Hat, that are held annually in Las Vegas present a unique tableau where the traditional (and traditionally overstated) conflict between underground hacking culture and corporate and government security professionals is suspended with the goal of openness and education. If you enjoy and own technology and gadgets of any kind, the conferences highlight a looming security crossroads that affects every layperson. Gizmag takes a look at some of the more important hacks from this year.  Read More

CreepyDOL is a new personal tracking system that allows a user to track, locate, and break...

Brendan O'Connor is an unabashed hacker who has worked for DARPA and taught at the US military's cybersecurity school. CreepyDOL (Creepy Distributed Object Locator), his new personal tracking system, allows a user to track, locate, and break into an individual's smartphone. "For a few hundred dollars," he says, "I can track your every movement, activity, and interaction, until I find whatever it takes to blackmail you."  Read More

The Canary security system is controlled by a smartphone app

According to the US Justice Department, people who live in rented homes are more likely to be burgled. In part, this is may be because flat dwellers aren't generally allowed to install security systems. As an alternative to teaching the hamster to bark, the Canary aims to put a complete security system into a self-contained, plug-and-play container that can be controlled by a smartphone app.  Read More

Looking for something? Search our 28,285 articles