In a previous post, we wrote about thieves increasingly targeting smartphone owners — and the unwillingness of cell service providers to address the problem. We’re happy to report that the major carriers have finally agreed to do the right thing and are set to begin blacklisting stolen smartphones later this year.
So what does this mean for the average cell phone user?Read More →
With the government shutdown of the popular file hosting website, Megaupload, cyber scammers have a new trick up their sleeves. It’s been reported that people in Germany have been receiving threatening emails accusing them of copyright infringement. To avoid a lengthy and expensive lawsuit, the victims are urged to pay a fee between 50 and 147 euros.Read More →
Passwords: They’re our main source of security online, but they’re vulnerable to hackers and they’re easy to forget. Through its Chrome web browser, Google is developing a new system of password management that promises to raise the bar for online security and make your life on the web easier to manage.Read More →
A strong solar storm hit the Earth’s atmosphere this Thursday morning, March 8th. The radioactive particles that were launched from the sun are currently battling our planet’s electromagnetic field and don’t appear to be causing any major problems. However, NASA warns that this solar outburst will last until about Friday morning and that at any time, power grids or GPS service might be temporarily compromised.Read More →
With last week’s Supreme Court ruling on GPS tracking by police, privacy in the digital age is getting more and more attention. The next issue the justices might have to tackle is whether or not it’s constitutional to use other forms of surveillance — including mobile body scanning technology, which the New York Police Department is set to begin testing this year.Read More →
Trendnet, a manufacturer of IP security cameras, has recently found that some of its network cameras leave video they transmit over the web unencrypted, even if a password was used. What this means for the owners of these Internet-connected cameras is that anyone with the right know-how may be able to gain access to a user’s video feed. Potential hackers only need to know the IP address of the vulnerable camera to gain access.Read More →