device

Thu
25
Oct
Dennis Faas's picture

How to Fix: Hackers Hacked My Email, Demand Bitcoin (Scam)

Infopackets Reader Sam G. writes: " Dear Dennis, I get emails from hackers a few times a week saying that they have cracked my email account. As proof, they have supplied me with the correct password for the account. The message goes on to say that ... they have planted a Trojan on my computer which allows them to spy on me. Here's where it gets interesting. The hackers say I have been visiting websites of people in the buff. They are demanding I pay them bitcoin (worth $831) to keep this quiet, otherwise they will send images from the purported site I've visited and also a picture of me on my ... (view more)

Wed
24
Oct
John Lister's picture

Home Gadget Promises More Secure Email

A new gadget is designed to keep emails "totally secure and private." It comes with a big financial and convenience cost, however. Helm is promoted as an alternative to web-based email such as Gmail. It's based on the idea that such services pose a ... risk because they could be hacked or the providers forced by a court to hand over messages. Instead, Helm wants people to use a personal email server in their home - a bit like an ultra-secure mailbox. Normally email servers are bulky and require considerable technical knowledge. Device Requires Physical Key The Helm device is instead ... (view more)

Tue
21
Aug
John Lister's picture

Skype Offers Secret Calling, End-to-End Encryption

Skype has added a new "private conversations" feature. Calls made this way will be encrypted so that it's impossible for anyone to usefully intercept or listen in. The data for such calls will use end-to-end encryption. That means the data is ... encrypted on one user's device and kept that way throughout its journey over the Internet until it reaches the other user's device. If the data is intercepted, it won't be of any use. The system will work on a "conversation" basis rather than a call-by-call basis. One user must select the feature, which will then send ... (view more)

Tue
07
Aug
John Lister's picture

New Android Pie Improves CPU, Battery, 'Wellbeing'

The next edition of the Google Android operating system for phones and tablets will include measures to help users spend less time on their mobile devices. The update also makes notifications more useful and addresses battery life problems. The ... changes come in a new version of the operating system that's officially called Android 9.0 but nicknamed Android Pie (or "Android P"), continuing a pattern of naming updates after food. It's already available for Google's own Pixel phones and will then start gradually rolling out to other models, though older handsets may not get the update. ... (view more)

Tue
26
Jun
John Lister's picture

Android Apps Now have Secure ID; Avoid Malicious Installs

Google is to mark Android apps to show they originated in the Google Play store. It's described as a security measure that could be particularly helpful in places with unreliable data connections. The change is to APK files, which stands for ... "Android PacKage"; these are files used to install an Android application on an Android device. Whenever you download an app from the Google Play store, it's always an APK file which is installed. However, the format is also the same if the app were to be downloaded from a third party website. Google is adding security metadata to all APKs ... (view more)

Tue
17
Oct
John Lister's picture

New Wi-Fi Crack can Intercept Your Data: What You Need to Know

One of the key security protections in WiFi has a serious vulnerability, a researcher has revealed. The exploit has to do with the protocol "WPA2" - currently considered the most secure protocol commonly used on WiFi routers and hotspots. Here's ... what you need to know about the WPA2 exploit. What's the problem and what does it affect? Security researcher Mathy Vanhoef has published a demonstration for what he's called "KRACKs," short for key reinstallation attacks. That's a way of exploiting a weakness in WPA2 (WiFi Protected Access II), the security system that is most ... (view more)

Wed
13
Sep
John Lister's picture

Billions of Bluetooth Devices at Risk of Malware Infection

The majority of Bluetooth devices could be vulnerable to a malware attack. The attack, dubbed BlueBorne, can reportedly spread to devices without needing any action from the victim. The attack takes advantage of a bug in the Bluetooth technology ... itself rather than a specific operating system. At one point this summer an estimated 5.3 billion devices were at risk, running Windows, Android or Linux, as well as Apple devices running systems before the current iOS 10. Fixing the problem will require patches for specific devices and operating systems. Microsoft has patched the issue already, ... (view more)

Wed
15
Mar
John Lister's picture

Adult Toy Tracked User Activity, Prompts Lawsuit

The makers of a remote controlled device for personal pleasure have agreed to pay $3.75 million after allegedly collecting data on how the device was used. Standard Innovations has not formally admitted any wrongdoing. The company makes several ... models in the We-Vibe line, each designed for intimate female use. Some of them include a Bluetooth connection that in turn connects to a smartphone. That allows the user or a partner to remotely control the operation and settings of the device, with an option for partners in long-distance relationships to operate the device over the Internet. ... (view more)

Tue
03
Jan
John Lister's picture

Lost Wallet? Device Tracker Uses 'Crowd GPS', Smartphone

A $30 tracking device could make it easier to find lost wallets or other items, but there's a big catch. While the "TrackR" range works fine around the house, if you lose your wallet while away from home, you may be reliant on other people having ... subscribed to the service. The range is billed as being the smallest tracking devices on the market. It comes in two models: the $30 TrackrR wallet 2.0, which is a two millimeter thick credit card-sized device for putting into a wallet, and the $25 TrackR Pixel, which is a similar size to a quarter coin but a little thicker, designed ... (view more)

Tue
13
Dec
John Lister's picture

Samsung Note 7 to be Disabled Remotely: No Recharge, Signal

Samsung is to remotely block the controversial Galaxy Note 7 phone from recharging. It's an attempt to persuade users who've hung on to the potentially-exploding handset to return the device for a refund. The phone was officially recalled by Samsung ... after reports of handsets overheating and causing burns, and in some cases catching fire. While Samsung is yet to release an official report into the causes of the problem, independent analysis suggests the phone's thin design put too much stress on the battery . To date, around 93 percent of the Note 7's sold to the public have ... (view more)

Pages

Subscribe to RSS - device