StayLocked prototype renders your stolen bike unusable, won’t buy you another

If you can’t ride your stolen bike, neither should anyone else. That’s the basic premise behind StayLocked Bicycle — a prototype that effectively self-destructs whenever someone tries to snatch it. The magic lies in the bike’s integrated locking mechanism, which is built in to a pair of tubes extending from the back wheel to the seat. Riders can attach the swiveling lock to any fixed post, but if someone successfully breaks it, the bike’s chain stays will no longer support his or her weight, rendering the prototype virtually useless, and the thief utterly embarrassed. Of course, this system won’t deter criminals from stealing a cycle for its parts, and it’s certainly not as ideal a solution as, say, actually getting your bike back. But at least you’d feel better knowing that whoever swiped your ride probably looked ridiculous while doing so.

StayLocked prototype renders your stolen bike unusable, won’t buy you another originally appeared on Engadget on Tue, 13 Sep 2011 10:54:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceWired  | Email this | Comments

Scientists build WiFi hunter-killer drone and call it SkyNET… Viene Tormenta!

You’d think scientists would proscribe certain names for their inventions — you wouldn’t be taken seriously if your supercomputer was called HAL 9000, WOPR or Proteus IV would you? Well, a team from the Stevens Institute of Technology isn’t listening, because it’s developing an aerial drone and calling it SkyNET. A Linux box, strapped to a Parrot A.R. Drone, can fly within range of your home wireless network and electronically attack it from the air. Whilst internet-only attacks are traceable to some extent, drone attacks are difficult to detect until it’s too late — you’d have to catch it in the act and chase it off with a long-handled pitchfork, or something. The team is working on refining the technology to make it cheaper than the $600 it currently costs and advise that people toughen up their domestic wireless security. We advise they stop pushing us ever closer towards the Robopocalypse.

Scientists build WiFi hunter-killer drone and call it SkyNET… Viene Tormenta! originally appeared on Engadget on Sat, 10 Sep 2011 05:58:00 EDT. Please see our terms for use of feeds.

Permalink Crave  |  sourceSkyNET Paper (PDF)  | Email this | Comments

How to Terror-Proof the New World Trade Center

Developers of the new World Trade Center learned a slew of lessons from the numerous attacks and eventual collapse of the original buildings—reexamining every aspect of the security and safety systems. Here’s what they’ve figured out. More »

AOptix e-Gate could improve global airport security, replace ID checks with iris scans


You’re certainly not alone if you think that the current airport security process is far from ideal. AOptix hopes to streamline and speed up security procedures by replacing manual boarding pass and ID checks with a biometric kiosk called e-Gate. The new system, which verifies passenger identities by matching an iris scan with a boarding pass, just received (IATA) approval, and is currently being tested in three airports around the world. It’s not as slick as a similar concept we saw earlier this summer, but e-Gate could be implemented with a trusted traveler program, creating special lanes for pre-approved frequent fliers — similar to the US Customs Global Entry system in place today. We don’t see it replacing X-ray machines and check-in interviews, but it could remove human error from the equation — at least when it comes to verifying your identity. Jump past the break for the full scoop from AOptix, or you can check out the system for yourself at the Future Travel Experience in Vancouver.

Update: e-Gate is in fact a potential component of Checkpoint of the Future, which we saw conceptualized in June.

Gallery: AOptix e-Gate

Continue reading AOptix e-Gate could improve global airport security, replace ID checks with iris scans

AOptix e-Gate could improve global airport security, replace ID checks with iris scans originally appeared on Engadget on Thu, 08 Sep 2011 17:50:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceAOptix  | Email this | Comments

ASUS Eee Slate B121 slabs it up for the enterprise market

Temper that excitement. This isn’t the rumored quad-core, Kal-El running Transformer 2. Still, ASUS is doing its best to port the tab buzz to the enterprise set with its quietly introduced Eee Slate B121. Unlike its tablet PC bretheren, this business-minded slate runs Windows 7 Professional atop an Intel Core i5 processor, and comes loaded with the security tweaks necessary for the corporate road warrior: like Computrace LoJack for remote location and data wipe, and a Trusted Platform Module microchip that stores encrypted data. Also tacked on to the $1,500 12.1-inch package are a Bluetooth keyboard and Wacom Digitizer stylus. As for the specs, well, there’s a 1280 x 800 LED Gorilla Glass display, 4GB RAM, 64GB of storage, dual USB 2.0 ports, mini-HDMI out, SD card slot and 2 megapixel front-facing camera. No official word on exactly when this biz-friendly tablet’ll be available, but now would be a good time to convince your IT department to order it up. Be sure to hit the source below for the company’s soft sell.

ASUS Eee Slate B121 slabs it up for the enterprise market originally appeared on Engadget on Thu, 08 Sep 2011 13:21:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceASUS  | Email this | Comments

Sony nabs former U.S. Department of Homeland Security official

Sony spent a fair bit of time at last week’s IFA press conference assuring the press and consumers that it’s doing its darnedest to stay on top of the security issues that have plagued it over the past year. It’s hard to imagine a move more representative of such a stance than the hiring of a former U.S. Department of Homeland Security official. The company announced today that it has done just that, scooping of former U.S. National Cyber Security Center director Philip Reitinger for a senior vice president position. And in case there was any question as to the reasoning behind the decision, a Sony spokesperson addressed the issue, stating, “certainly the network issue was a catalyst for the appointment.” Fair enough, Sony.

Sony nabs former U.S. Department of Homeland Security official originally appeared on Engadget on Tue, 06 Sep 2011 08:55:00 EDT. Please see our terms for use of feeds.

Permalink The Inquirer  |  sourceReuters  | Email this | Comments

Izon Spy Camera Streams Video to iOS Devices

Monitor the baby, or make a celebrity-style sex tape. You decide. Photo credit Stem Innovation

Izon is a “remote room monitor” which beams video across the Internet and onto the screen of your iPad, iPhone or iPod. It might also be described by a more cynical person than myself as a kind of lifestyle spy camera.

The Izon is a white plastic stick which swivels on its dome-shaped magnetic base to be easily pointed at whatever you want to spy on. Then, when away from home or office, you can dial in via a companion app and enjoy a live stream of whatever is going on. You could check in on your baby whilst away on a trip, for example, or watch impotently from afar as burglars empty your house and smear their feces across its walls before they finally steal the Izon too, and its high-quality video stream blinks out.

Once connected to your home Wi-Fi network, the Izon’s stream can be viewed over Edge, 3G or Wi-Fi, and you can also tell it to keep an eye on a specific part of its field of view using a motion sensor. It can also listen for noises, and will send a push alert to your device when anything is detected.

Only you know whether you want or need such a thing, but if you do, then its nice to know there’s such a user-friendly option out there, and one which costs a reasonable $130. Just one thing: if you do buy one, be careful when you and your lady or gentleman get frisky in the same room: The Izon has a function which will automatically upload video to YouTube.

Izon product page [Stem. Thanks, Matt!]

See Also:


Android Malware Explodes, iOS Remains Safe

Android malware jumped 76 percent since last quarter. Image credit McAfee

According to a report by antivirus software maker McAfee, Android is now the “most attacked mobile operating system,” with a jump in malware attacks of 76 percent in the last quarter. This impressive win is even more so when you consider that Android “outpaces second place Java ME threefold”.

While we are normally skeptical of scary announcements from anti-malware companies, this is McAfee’s regular quarterly report outlining the state of general security, so the numbers are probably good.

Interestingly, you’ll see that iOS doesn’t appear on the above chart at all. It seems like Android’s “open” nature is indeed open, in that anyone can put any software, including malware, on your phone. John Gruber of Daring Fireball sums it up thusly: “Remember the old argument about Apple platforms not getting malware only because they weren’t popular enough to attract attention?”

So what’s the solution? Crapware! Over at PC Pro, Mike Jennings got a new Android phone to play with.

On Friday, I eased the Sony Ericsson Xperia Mini Pro from its box, turned it on, and was greeted with a message urging me to set up McAfee WaveSecure before I’d even set up the phone with my Google account.

While this scary first experience might help to make Windows users feel at home, there’s no way we should have to deal with this kind of crap on our mobile devices, especially as we have a lot more personal information on there than we do on our computers. It certainly makes a powerful argument for Apple’s conservative, controlled approach.

McAfee Q2 2011 Threats Report Shows Significant Growth for Malware on Mobile Platforms [McAfee]

Malware slams Android, but not iOS [The Loop]

See Also:


8 Tools for Getting Out of Libya Alive

When dudes start firing off home-brew, truck-mounted rockets and bandying about phrases like “open, armed rebellion,” it’s high time to get the f-ck out of Tripoli. These eight tools will help get you to your Embassy in one piece.

More »

Quantum entanglement could mean completely secure data transfer

By tapping into Albert Einstein’s idea of “spooky action at a distance,” researchers at the University of Copenhagen’s Niels Bohr Institute have discovered what might be the key to completely secure data transfer — keeping particles “entangled” for up to an hour. Until now, the link between two entangled systems could only be maintained for a fraction of a second. This development could enable a direct link between two systems of communication — you do something to one and the other will “know.” Although limited to the lab right now, scientists are working on practical applications for networking and the internets. Hey, SSH maybe it’s time you started watching your back. Check out the full PR after the break.

[Thanks Nan]

Continue reading Quantum entanglement could mean completely secure data transfer

Quantum entanglement could mean completely secure data transfer originally appeared on Engadget on Sun, 21 Aug 2011 05:28:00 EDT. Please see our terms for use of feeds.

Permalink Science Daily  |  sourceNiels Bohr Institute  | Email this | Comments