device

Wed
27
Mar
John Lister's picture

Apple Devices Need 51 Important Security Updates

Apple has released a patch for mobile devices which covers 51 security flaws. It's sparked debate over Apple's security levels and the way it issues such updates. The patch is for iOS, taking it up to version 12.2. Apple doesn't issue standalone ... security updates. Instead, it builds it into the main update for the system, which also includes new features or bug fixes. (Source: apple.com ) The most notable fix is a bug in an API (application program interface), which lets third party software interact with Apple services. In this case, the API bug could allow malware to access an iPhone, iPad ... (view more)

Wed
30
Jan
John Lister's picture

WiFi Could Provide Electricity, Charge Smartphone

A new gadget can turn WiFi signals into electricity. It could one day mean an end to charging phone batteries, though the power levels mean medical uses might be more realistic. The device is a new variant of a "rectenna," which is short for ... rectifying antenna. Traditionally it turns electromagnetic energy into direct current electricity. Although the rectenna was developed more than 50 years ago, it's not been widely used. At the moment the most common use is in contactless cards, where a wireless signal from a card reader can not only open communications, but provide just enough ... (view more)

Mon
21
Jan
Dennis Faas's picture

How to Fix: Your Device is Having Trouble Recognizing You (Windows 10 Fingerprint)

Infopackets Reader Dave T. writes: " Dear Dennis, I recently upgraded my motherboard and CPU, which meant having to reinstall Windows 10 from scratch. I have a USB fingerprint reader that I've been using for years prior to the hardware upgrade, and ... it worked flawlessly. However, since I have had to reinstall Windows, the fingerprint reader keeps saying 'your device is having trouble recognizing you' whenever I try to sign in to Windows 10. If I keep swiping, I keep getting the same error message and eventually I have to enter my PIN in order to login. How can I make my fingerprint recognize ... (view more)

Mon
12
Nov
John Lister's picture

Amazon Echo Features In Second Murder Case

A judge says Amazon must hand over recordings from an Echo smart speaker to assist with a stabbing case that left two women dead. It's the first time such a court order has been made without a defendant's permission. The New Hampshire case involved ... two women's bodies being discovered under a porch. A man who knew the boyfriend of one of the victims has been charged with two counts of first degree murder, and has pleaded not guilty. Prosecutors say there is probable cause that the device could contain potential evidence which could include "audio recordings of the attack and events that ... (view more)

Thu
25
Oct
Dennis Faas's picture

How to Fix: Hackers Hacked My Email, Demand Bitcoin (Scam)

Infopackets Reader Sam G. writes: " Dear Dennis, I get emails from hackers a few times a week saying that they have cracked my email account. As proof, they have supplied me with the correct password for the account. The message goes on to say that ... they have planted a Trojan on my computer which allows them to spy on me. Here's where it gets interesting. The hackers say I have been visiting websites of people in the buff. They are demanding I pay them bitcoin (worth $831) to keep this quiet, otherwise they will send images from the purported site I've visited and also a picture of me on my ... (view more)

Wed
24
Oct
John Lister's picture

Home Gadget Promises More Secure Email

A new gadget is designed to keep emails "totally secure and private." It comes with a big financial and convenience cost, however. Helm is promoted as an alternative to web-based email such as Gmail. It's based on the idea that such services pose a ... risk because they could be hacked or the providers forced by a court to hand over messages. Instead, Helm wants people to use a personal email server in their home - a bit like an ultra-secure mailbox. Normally email servers are bulky and require considerable technical knowledge. Device Requires Physical Key The Helm device is instead ... (view more)

Tue
21
Aug
John Lister's picture

Skype Offers Secret Calling, End-to-End Encryption

Skype has added a new "private conversations" feature. Calls made this way will be encrypted so that it's impossible for anyone to usefully intercept or listen in. The data for such calls will use end-to-end encryption. That means the data is ... encrypted on one user's device and kept that way throughout its journey over the Internet until it reaches the other user's device. If the data is intercepted, it won't be of any use. The system will work on a "conversation" basis rather than a call-by-call basis. One user must select the feature, which will then send ... (view more)

Tue
07
Aug
John Lister's picture

New Android Pie Improves CPU, Battery, 'Wellbeing'

The next edition of the Google Android operating system for phones and tablets will include measures to help users spend less time on their mobile devices. The update also makes notifications more useful and addresses battery life problems. The ... changes come in a new version of the operating system that's officially called Android 9.0 but nicknamed Android Pie (or "Android P"), continuing a pattern of naming updates after food. It's already available for Google's own Pixel phones and will then start gradually rolling out to other models, though older handsets may not get the update. ... (view more)

Tue
26
Jun
John Lister's picture

Android Apps Now have Secure ID; Avoid Malicious Installs

Google is to mark Android apps to show they originated in the Google Play store. It's described as a security measure that could be particularly helpful in places with unreliable data connections. The change is to APK files, which stands for ... "Android PacKage"; these are files used to install an Android application on an Android device. Whenever you download an app from the Google Play store, it's always an APK file which is installed. However, the format is also the same if the app were to be downloaded from a third party website. Google is adding security metadata to all APKs ... (view more)

Tue
17
Oct
John Lister's picture

New Wi-Fi Crack can Intercept Your Data: What You Need to Know

One of the key security protections in WiFi has a serious vulnerability, a researcher has revealed. The exploit has to do with the protocol "WPA2" - currently considered the most secure protocol commonly used on WiFi routers and hotspots. Here's ... what you need to know about the WPA2 exploit. What's the problem and what does it affect? Security researcher Mathy Vanhoef has published a demonstration for what he's called "KRACKs," short for key reinstallation attacks. That's a way of exploiting a weakness in WPA2 (WiFi Protected Access II), the security system that is most ... (view more)

Pages

Subscribe to RSS - device