Apple announces iPhone 6, Apple Watch

Security

Is your data is safe on open public WiFi? (Photo: Shutterstock)

There are plenty of opportunities to connect to public Wi-Fi hotspots when you're on the go these days. Coffee shops, hotels, restaurants and airports are just some of the places where you can jump online, but often these networks are open and not secure. Whether you're using a laptop, tablet or smartphone, you'll want to connect your device securely to protect your data as much as possible. Here's some simple steps you can take to help make sure your data is safe on open public Wi-Fi.  Read More

The Moto Skip, assuming it reappears on Motorola's website, will let you unlock your Moto ...

A passcode or pattern lock is a great way to keep your phone secure, but they can be a bit of a hassle. Motorola Skip is a new accessory that uses NFC to bypass the pesky part of securing your phone.  Read More

DefCon and Black Hat highlight the fact that companies often seem more concerned about the...

The cyber security convention DefCon and its corporate counterpart, Black Hat, that are held annually in Las Vegas present a unique tableau where the traditional (and traditionally overstated) conflict between underground hacking culture and corporate and government security professionals is suspended with the goal of openness and education. If you enjoy and own technology and gadgets of any kind, the conferences highlight a looming security crossroads that affects every layperson. Gizmag takes a look at some of the more important hacks from this year.  Read More

CreepyDOL is a new personal tracking system that allows a user to track, locate, and break...

Brendan O'Connor is an unabashed hacker who has worked for DARPA and taught at the US military's cybersecurity school. CreepyDOL (Creepy Distributed Object Locator), his new personal tracking system, allows a user to track, locate, and break into an individual's smartphone. "For a few hundred dollars," he says, "I can track your every movement, activity, and interaction, until I find whatever it takes to blackmail you."  Read More

The Canary security system is controlled by a smartphone app

According to the US Justice Department, people who live in rented homes are more likely to be burgled. In part, this is may be because flat dwellers aren't generally allowed to install security systems. As an alternative to teaching the hamster to bark, the Canary aims to put a complete security system into a self-contained, plug-and-play container that can be controlled by a smartphone app.  Read More

The Recordura electronic door lock runs purely on electricity generated by users pushing o...

Smartphone-enabled electronic door locks such as the Unikey, Lockitron and Goji do have advantages over their traditional counterparts – digital “keys” can be sent to multiple users’ phones, access to locked rooms can be limited to specific dates and/or times for certain users, and keys stored on lost phones can simply be deactivated. However, as with just about any electronic version of a purely-mechanical device, they do introduce one complicating factor: they require a power supply. The Recordura lock, however, generates its own electricity when users push on its handle.  Read More

The myIDkey voice-searchable USB drive for password management

Password manager programs allow users to store all their personal login information behind one master password. Now, a product called myIDkey is looking to make that process portable. It's a fingerprint-encrypted, voice-searchable thumb drive that stores all of a user's passwords and private data.  Read More

Applied DNA Sciences (ADNAS) has developed a new approach to solve crimes using DNA taggin...

Applied DNA Sciences (ADNAS) has developed a new approach to solve crimes using DNA tagging. The difference is that instead of tagging the objects being stolen, the company's system tags the perpetrator with DNA. While this has been tried before by applying the DNA to a fleeing criminal with a gun, ADNAS has adopted a more subtle approach.  Read More

Prof. William Dichtel and Deepti Gopalakrishnan with samples of the polymer

Detecting bombs in places such as airports could be getting easier, thanks to a new fluorescing polymer. While you might expect the material to glow in the presence of explosives, they actually cause it to stop glowing.  Read More

In a series of bombshell leaks, the extent of the US government's alleged spying on Americ...

If there was any doubt that George Orwell's Nineteen Eighty-Four was a prophetic piece of fiction, you can pretty much put that to rest. The more skeptical among us have claimed for years that, in the age of the internet, nobody has real privacy. During the last 24 hours, those fears emerged from the shadows. Details leaked of the secret US National Security Agency (NSA) program called PRISM, which may as well have been called Big Brother.  Read More

Looking for something? Search our 28,487 articles