devices

Wed
27
Mar
John Lister's picture

Apple Devices Need 51 Important Security Updates

Apple has released a patch for mobile devices which covers 51 security flaws. It's sparked debate over Apple's security levels and the way it issues such updates. The patch is for iOS, taking it up to version 12.2. Apple doesn't issue standalone ... security updates. Instead, it builds it into the main update for the system, which also includes new features or bug fixes. (Source: apple.com ) The most notable fix is a bug in an API (application program interface), which lets third party software interact with Apple services. In this case, the API bug could allow malware to access an iPhone, iPad ... (view more)

Wed
13
Mar
John Lister's picture

Apple Wants To Block Police Phone Tracking

Apple wants to patent a technology that would make it harder for police to track people's location through their phone. The technology wouldn't make messages and calls secret, but rather make it harder to prove who owned the phone in question. The ... patent is for end-to-end encryption for the mobile subscriber identification number (MSNI). That's part of a longer number that also identifies the country and mobile network a phone is registered to What's important here is that the MSNI identifies the specific handset. Police could then force a mobile carrier to hand over the ... (view more)

Wed
16
Jan
John Lister's picture

Court Rules Against Forced Fingerprint Unlock

A judge says police can't force a suspect to unlock a phone with a fingerprint or other biometric measure, including a suspect's face . It's the latest step in the way privacy laws interact with technological changes. This ruling came from a federal ... judge in a court in California and involved a review of a search warrant request. The case involved two suspects allegedly using Facebook Messenger to trying to extort a victim by threatening to publish an embarrassing video. (Source: gizmodo.com ) The police wanted permission to not only search a location where they believed they would find the ... (view more)

Tue
09
Oct
John Lister's picture

Facebook Launches Dedicated Screens

Facebook is launching dedicated devices for video-calling friends and family. While they have some impressive technology, it's a bold move from a company whose reputation on privacy issues is controversial to say the least. The devices are known as ... the "Portal" and "Portal+". They both offer some of the features of 'smart speakers' such as Google Home and the Amazon Echo, but the main function is for making video calls. That's reflected in the 10 inch screen of the Portal and the 15 inch screen of the Portal+. There's no charge for making calls on the devices as they work ... (view more)

Wed
11
Jul
John Lister's picture

Smart Home Tech Dangerous if Relationships Sour

Researchers have warned that smart home technology could be used to aid domestic abuse. They've put together resources for people who could be threatened by abusive partners or former partners. The list comes from University College London and ... follows a New York Times article detailing some of the way domestic abusers have turned smart home tech into a tool to further their abuse. One example is a former partner taking account of a security loophole to continue to access a smart doorbell. That meant they could not only watch video of the partner leaving or returning from the house and monitor ... (view more)

Fri
06
Jul
Dennis Faas's picture

How to Fix: GoDaddy Email Not Syncing (IMAP Not Working)

Infopackets Reader Allan J. writes: " Dear Dennis, I own a website that is hosted through GoDaddy.com; I signed up for a 5 year contract ($600) which covers my hosting and registrar fees. I own a smartphone, a PC, and a laptop for my work and am ... attempting to sync my email across the devices so that I can view all my messages, regardless of which device I use. I've tried setting this up myself, but my emails automatically download onto one of the three devices at random, and nothing gets synced. When I checked my computer, some emails have been downloaded throughout the day, while other ... (view more)

Thu
14
Dec
John Lister's picture

Trio Admits Hijacking Home Devices

Three Americans have plead guilty to hijacking more than 100,000 internet-connected devices. The group of infected machines (known as a "botnet") was then used to attack websites using a distributed denial of service attack (DDoS) to make websites ... unavailable. While most DDoS attacks are carried out on PCs, this attack in particular targeted weaknesses in smaller devices that use the Internet. This included routers, digital video recorders and wireless cameras. That's a significant point, as the tech security community has generally treated security flaws in such devices as a lower ... (view more)

Thu
07
Dec
John Lister's picture

YouTube Pulled From Amazon Gadgets

Users of some Amazon gadgets will have to look elsewhere for YouTube videos, after Google announced it will block the site from the devices. It's a tit-for-tat response to Amazon refusing to stock some Google hardware products. YouTube will be ... blocked from January 1st, 2018 on Amazon Fire TV devices, which include both table-top boxes and HDMI sticks. There's also an immediate block on YouTube on the Echo Show, which is a variant of the 'smart speaker' range that includes a screen. Google had already blocked YouTube on the Echo Show once but Amazon found a workaround. That workaround has now ... (view more)

Wed
06
Dec
John Lister's picture

New Windows 10 Laptops 'Could Run For Weeks'

Microsoft says new Windows laptops could last more than 20 hours of continued use without needing a recharge. Other changes mean its plausible the machines could be permanently connected to the Internet. The difference is all about the processors: ... the part of the computer that actually does the calculations which are at the heart of every computing activity. Usually Windows PCs run x86 processors (or compatible), most commonly produced by Intel and AMD. Now Microsoft is making a fresh attempt at Windows laptops that run the rival ARM processors, which are already used in the vast majority of ... (view more)

Tue
17
Oct
John Lister's picture

New Wi-Fi Crack can Intercept Your Data: What You Need to Know

One of the key security protections in WiFi has a serious vulnerability, a researcher has revealed. The exploit has to do with the protocol "WPA2" - currently considered the most secure protocol commonly used on WiFi routers and hotspots. Here's ... what you need to know about the WPA2 exploit. What's the problem and what does it affect? Security researcher Mathy Vanhoef has published a demonstration for what he's called "KRACKs," short for key reinstallation attacks. That's a way of exploiting a weakness in WPA2 (WiFi Protected Access II), the security system that is most ... (view more)

Pages

Subscribe to RSS - devices