Smart lock screens that will let you be super secure without ever entering a PIN again. Well, it’s there now and it works as advertised. Just pair your favorite wearable or Bluetooth gizmo, and the secure lock screen goes away. Lose connection, and it’s back.
Google’s two-factor authentication system is a great way to keep your email and other accounts safe, especially if you’ve always got a smartphone (or even a dumb phone) around. Today Google is adding even more options beyond the current phone call, text message, email, and app-based verification. The latest update to the desktop version of
Tablets and cell phones not only can track you but also act as remote listening and video recording devices. These devices can be remotely turned on and have your conversations listened to. DETRACKTOR products will stop the tracking and bugging of your cell phone and tablets as well as protect your ID and credit cards
What’s not to like about the Internet of Things? You drive to work in your connected car while the GPS automatically navigates you away from a traffic jam that would have parked you on the expressway for two hours. At the same time, your onboard messaging app reads you an email from your boss telling
Part of the Government’s ongoing National Security agenda would see the Australian Customs and Border Protection agency gather oodles of biometric data on travellers going in and out of Australia and share it with various law enforcement agencies around the country. The plan may be headed for a happy derailment, however, after a bi-partisan Parliamentary
In the closing credits of Citizenfour, Poitras took the unusual step of adding an acknowledgment of the free software projects that made the film possible: The roll call includes the anonymity software Tor, the Tor-based operating system Tails, GPG encryption, Off-The-Record (OTR) encrypted instant messaging, hard disk encryption software Truecrypt, and Linux. All of that
As most of you are aware it’s very unusual for me to post any software updates – I’m not your mum. If you use it you should know how to look after it. BUT, here are two you should be aware of. Tor Browser 4.0 is released The first release of the 4.0 series is
Welcome to the September edition of the Symantec Intelligence report. Symantec Intelligence aims to provide the latest analysis of cyber security threats, trends, and insights concerning malware, spam, and other potentially harmful business risks.
Blackphone has a problem. The mere fact of holding one in your hand advertises to the world that you’re using a Blackphone. That might not be a big problem for people who can safely be assumed to have access to sensitive information—politicians, security contractors, say—but if you’re a journalist investigating your own corrupt government or
You know that passwords are inadequate for securing your online accounts. Two-step authentication is better. It requires you to enter additional information, such as a number the site texts to you, in order to access your account. It’s less convenient, but more secure. Every site that offers two-factor authentication has a different way of enabling
With all the security issues cropping, we all do our best to get everyone to understand what the issue is. I’m sure we all know someone who says “I have nothing to hide”. Here is a great argument for that: “Over the last 16 months, as I’ve debated this issue around the world, every single
No tool in existence protects your anonymity on the Web better than the software Tor, which encrypts Internet traffic and bounces it through random computers around the world. But for guarding anything other than Web browsing, Tor has required a mixture of finicky technical setup and software tweaks. Now routing all your traffic through Tor
Today we’re releasing Qubes OS R2! I’m not gonna write about all the cool features in this release because you can find all this in our wiki and previous announcements. Suffice to say that we’ve come a long way over those 4+ years from a primitive proof of concept to a powerful desktop OS which,
Secrecy is a [new and untested] free and open source app (so you can really test out its protection claims if you want) that lets you create password protected vaults. You can store any kind of data in these vaults – photos, videos, even important documents from Google Drive. Everything stored in a vault is
Take cybersecurity into your own hands. In this Lab, you’ll defend a company that is the target of increasingly sophisticated cyber attacks. Your task is to strengthen your cyber defenses and thwart the attackers by completing a series of cybersecurity challenges. You’ll crack passwords, craft code, and defeat malicious hackers.