wearables-security-risksSince last year, noise about wearable technology has twittered through the tech community, reaching a fever pitch at this year’s Consumer Electronics Show. While the consumer benefits and applications are apparent, numerous questions have arisen over how this new brand of technology will impact security.

Read More →

Many have predicted that the legacy of the London 2012 Olympics will be one of surveillance, but with New York’s recent “Domain Awareness System” announcement, it’s looking like city security expansion will be the legacy of 2012 in general.

Read More →

This past weekend, the internet shed a collective tear for tech writer Mat Honan as his entire digital identity was eviscerated by hackers for no particular reason (unless you consider the fact that they liked his short Twitter handle, @mat, as a legitimate reason). In the wake of this Epic Hack, nearly every tech blog has offered suggestions on how to secure your online identity; here is a rundown of some of the best advice:

Read More →

When you think of surveillance or security cameras, the image that usually comes to mind is that of a camera attached to a wall or even built into something such as a door frame above the main entrance of a building. But with the widespread use of military drones and other remote-controlled devices, security cameras might just go from stationary video recorders to fully remote-controlled surveillance spies.

Read More →

Portable authenticators, tiny devices that you can carry on your keychain for an added level of security, appear to be one of the best ways to ensure that your digital identities can’t be hacked. The way that these authenticators work is by displaying a new code every 60 seconds and are entered along with a password or a pin to gain access to an account. So if a hacker was able to steal your password in some way, they would also need your personal authenticator to log into your account.

Read More →

gadgetsAs we stumble headlong into the next generation of Web-enabled gadgets, oftentimes we look at what’s “cool” and what’s “innovative” moreso than what’s “secure.” This see-no-evil mentality has encouraged lackadaisical programmers to cut corners in the development of HDTVs, smartphones, and countless other products, which has, in turn, given rise to new avenues for hackers and scam artists.

Read More →