Traveling? Protect Your Backpack with an eXomesh Cage

When you carry a backpack, it’s like an invitation to thieves. A challenge even. It is tempting and they are no doubt hoping that you have some expensive Apple products in there. Don’t leave your bag unattended. But if you do, protect it with the Pacsafe steel mesh Bag Protector, which wraps around your valuables like a steel cage.
pacsafemagnify

It features their patented smart eXomesh® cage system, which provides an adjustable high-tensile stainless steel locking cage and cable for anything you want to surround.

Pacsafe protectors are perfect for small backpacks, luggage and other stuff. They come in a variety of sizes, and prices start at around $60(USD). Put a cage around your stuff and keep it safe.

[via werd via Oh Gizmo!]

Report: Google May Stop Using Cookies to Track Users

Report: Google May Stop Using Cookies to Track Users

According to a report from the WSJ, Google is considering ditching cookies to track its users. Instead, Google would "create its own anonymous identifier for each individual". Google, which has previously secretly planted cookies in Internet Explorer and the iPhone, says it’s an attempt to make the Internet more secure for users.

Read more…


    



Is the Data on Your SSD Secure?

SSDs are wonderful things that take up next to no space and are incredibly fast to boot. But while most people understand the basics data security on HDDs, the same isn’t necessarily true of solid state storage.

Read more…


    



Stop Worrying About the New iPhone’s Fingerprint Scanner

Stop Worrying About the New iPhone's Fingerprint Scanner

Last week’s announcement that the new iPhone 5 will include a fancy new fingerprint scanning security system was met with a chorus of protests. What if someone lifts my prints and makes a fake finger and unlocks my phone? What if the government snoops on my phone (more than it already does) and steals my fingerprints?? Oh God, what if muggers cut off my thumbs to unlock my phone when they steal it?!? Relax. None of that’s going to happen. Here’s why.

Read more…


    



QSAlpha trying to raise $3.2 million for its super-encrypted Quasar IV superphone

QSAlpha trying to raise $21 million for its superencrypted Quasar IV superphone

After Canonical asked the world for $32 million to produce its Ubuntu Edge handset, $3.2 million seems like small potatoes, right? All right, it’s still a bunch, but QSAlpha’s got some big plans for the money. The Quasar IV promises unprecedented security, according to the company’s new Indiegogo campaign. That entails military-grade encryption, with either 64- or 128GB of encrypted local storage augmented by a lofty 128GB encrypted in the cloud. The idea here is to “leave no trace in the digital world,” and just to be clear, the company’s got a ninja in its pitch video to really drive the point home. In fact, ninjas were apparently QSAlpha’s starting point: “if a ninja had a phone, what would it look like?” We’d guess more sharpened corners and maybe some smoke bombs, but this is a start.

Apparently it would also feature an Android / Linux / Quatrix hybrid called QuaOS based on Android 4.3 and rock some pretty heavy duty specs like a quad-core 2.3GHz Snapdragon 800 processor, 3GB RAM, 5-inch 1080p IGZO display, 3,300mAh battery, IP57 certification and dual 13MP rear facing cameras for a better augmented reality experience. Like what you hear? The first 1,250 backers to shell out $345 will get a 64GB version when the handset starts shipping in April. Miss out and you won’t be able to pick one up until June, and who knows what sorts of secrets you might spill in the meantime?

Filed under: ,

Comments

Source: Indiegogo

Google Knows the Wi-Fi Passwords of All Android Users

Google Knows the Wi-Fi Passwords of All Android Users

A new privacy fuss is kicking off around Google’s Android mobile OS, with security boffins claiming that the software’s backup tools mean that a copy of everyone’s Wi-Fi password history is now saved to Google’s servers. Which may mean it could be legally compelled to hand them out, should a government come calling.

Read more…


    



Android’s backup feature means Google knows most of the world’s WiFi passwords

As shipment numbers have shown many times, vast quantities of the technology-using public own or have owned an Android smartphone or an Android tablet, and as such have used Google’s operating system to log onto their own and likely other WiFi networks. What isn’t so commonly known is that those WiFi passwords are stored by […]

Vodafone Germany hack compromised two million customer accounts

Vodafone Germany has confirmed that about 2 million customer accounts have been compromised as a result of a recent server attack. Vodafone has said they are already working with the authorities and that a possible suspect has been identified. While that name hasn’t been released to the public, there was talk of how the person […]

Facebook’s Zuckerberg lambastes NSA, says government “blew it”

The Edward Snowden leaks and related government fallout has resulted in extensive backlash for technology companies cited in the PRISM documents, one of which is Facebook. The social network’s Mark Zuckerberg spoke about the matter today at the Disrupt tech conference, saying that he feels the government “blew it” in several ways. During an interview […]

iPhone 5s fingerprint reader has a timed safeguard, dislikes sweaty digits

iPhone 5S' fingerprint sensor has a 48hour unlock window, dislikes sweaty digits

Beyond the basics, Apple has said little of how the iPhone 5s Touch ID fingerprint reader works — we mostly know that it’s inaccessible to the outside world. Thankfully, the company has shed further light on Touch ID through statements to the Wall Street Journal. To start, iPhone owners will have to unlock with a passcode if they either reboot or haven’t unlocked within 48 hours. The safeguard prevents hackers from simply biding their time while they look for a workaround, Apple says. Legitimate users will also want to keep their hands dry, as the reader doesn’t work well with fingers covered in sweat and other liquids. You won’t want to try unlocking immediately after running, then, but it’s evident that Apple already knows many of Touch ID’s real-world limitations.

Filed under: , ,

Comments

Source: Wall Street Journal (1), (2)