Lollipop Smart Lock Screen

Smart lock screens that will let you be super secure without ever entering a PIN again. Well, it’s there now and it works as advertised. Just pair your favorite wearable or Bluetooth gizmo, and the secure lock screen goes away. Lose connection, and it’s back.

Google Adds USB Two-Factor Authentication

Google’s two-factor authentication system is a great way to keep your email and other accounts safe, especially if you’ve always got a smartphone (or even a dumb phone) around. Today Google is adding even more options beyond the current phone call, text message, email, and app-based verification. The latest update to the desktop version of

Detracktor Cell Phone Pouch

Tablets and cell phones not only can track you but also act as remote listening and video recording devices. These devices can be remotely turned on and have your conversations listened to. DETRACKTOR products will stop the tracking and bugging of your cell phone and tablets as well as protect your ID and credit cards

IoT: 7 Scary Security Scenarios

What’s not to like about the Internet of Things? You drive to work in your connected car while the GPS automatically navigates you away from a traffic jam that would have parked you on the expressway for two hours. At the same time, your onboard messaging app reads you an email from your boss telling

Biometric Data Collection Plans

Part of the Government’s ongoing National Security agenda would see the Australian Customs and Border Protection agency gather oodles of biometric data on travellers going in and out of Australia and share it with various law enforcement agencies around the country. The plan may be headed for a happy derailment, however, after a bi-partisan Parliamentary

Citizenfour

In the closing credits of Citizenfour, Poitras took the unusual step of adding an acknowledgment of the free software projects that made the film possible: The roll call includes the anonymity software Tor, the Tor-based operating system Tails, GPG encryption, Off-The-Record (OTR) encrypted instant messaging, hard disk encryption software Truecrypt, and Linux. All of that

Updates for Tor and Tails

As most of you are aware it’s very unusual for me to post any software updates – I’m not your mum. If you use it you should know how to look after it. BUT, here are two you should be aware of. Tor Browser 4.0 is released The first release of the 4.0 series is

Symantec Intelligence Report September 2014

Welcome to the September edition of the Symantec Intelligence report. Symantec Intelligence aims to provide the latest analysis of cyber security threats, trends, and insights concerning malware, spam, and other potentially harmful business risks.

DarkMatter

Blackphone has a problem. The mere fact of holding one in your hand advertises to the world that you’re using a Blackphone. That might not be a big problem for people who can safely be assumed to have access to sensitive information—politicians, security contractors, say—but if you’re a journalist investigating your own corrupt government or

Enable Two-Step Authentication

You know that passwords are inadequate for securing your online accounts. Two-step authentication is better. It requires you to enter additional information, such as a number the site texts to you, in order to access your account. It’s less convenient, but more secure. Every site that offers two-factor authentication has a different way of enabling

For those who have “nothing to hide”

With all the security issues cropping, we all do our best to get everyone to understand what the issue is. I’m sure we all know someone who says “I have nothing to hide”. Here is a great argument for that: “Over the last 16 months, as I’ve debated this issue around the world, every single

Anonabox

No tool in existence protects your anonymity on the Web better than the software Tor, which encrypts Internet traffic and bounces it through random computers around the world. But for guarding anything other than Web browsing, Tor has required a mixture of finicky technical setup and software tweaks. Now routing all your traffic through Tor

Qubes OS Release 2

Today we’re releasing Qubes OS R2! I’m not gonna write about all the cool features in this release because you can find all this in our wiki and previous announcements. Suffice to say that we’ve come a long way over those 4+ years from a primitive proof of concept to a powerful desktop OS which,

Secrecy App Locks Your Files

Secrecy is a [new and untested] free and open source app (so you can really test out its protection claims if you want) that lets you create password protected vaults. You can store any kind of data in these vaults – photos, videos, even important documents from Google Drive. Everything stored in a vault is

CyberSecurity Lab

Take cybersecurity into your own hands. In this Lab, you’ll defend a company that is the target of increasingly sophisticated cyber attacks. Your task is to strengthen your cyber defenses and thwart the attackers by completing a series of cybersecurity challenges. You’ll crack passwords, craft code, and defeat malicious hackers.