If you follow any of the Gear Diary editors on Twitter, you know that during CES 2010 we were constantly tweeting our location. One day during the show, after tweeting that I was near the South Hall, I received an @ reply from one of the vendors on display there. Phone Halo asked that I [...]
(Photo courtesy phandroid) Paranoid about your personal data on your smartphone? You probably set the pattern lock on your Droid and figured you’d be all set. And you are…until you get a phone call.
Photo courtesy of myadbox News from Berlin reports that 28-year-old Encryption expert Karsten Nohl was able to decipher the 21-year-old GSM algorithm that encrypts about 3.5 billion cell phones. The effects about 299 million customers alone in the US. Nohl presented his case at the Chaos Communication Congress to educate the community and raise security [...]
There are a lot of potential benefits to jailbreaking your iPhone, but there are also potential downsides. Case in point: as if it weren’t bad enough to have your iPhone Rickrolled, there is now a worm the exploits the same weakness on jailbroken iPhones and does real damage. This worm affects jailbroken iPhones with SSH [...]
How many times have you called someone from your mobile phone instead of sending an email because you didn’t want a “paper trail?” Maybe because you didn’t want an email to be forwarded on because the information was confidential. Perhaps the message you chose to conduct over a direct phone call from your mobile contained [...]
This is for all of you Christians out there, in love with your own Roxane but too flummoxed to speak eloquently without a little help. Now, instead of hiding Cyrano in a nearby bush – ever fearful of being caught – as you regurgitate his lovely lines, you can slip this Brickhouse Security Invisible Bluetooth [...]
“Hey D,” Elana said as she came down the step the other night, “did you spend $170 at Macy’s yesterday?” “Macy’s??” I asked, “No way. I mean, when was the last time I went shopping for any non-tech item without you? Why do you ask?” “Because AmexEx emailed and was checking up on a suspect [...]
We told you it was coming, and now General Motors and OnStar report the first successful use of their Stolen Vehicle Slowdown technology to end a carjacking in California.
The new Amber Alert GPS is a handy (albeit costly at $279 plus monitoring fees) device for parents wanting to keep track of their children. Slip the GPS into a backpack or other secure location. Throughout the day you receive text messages that show you exactly where your child is. Safety zones can be setup [...]
It’s been a bad, bad week for data of all types, it seems… Macrumors is reporting on a new bug in Snow Leopard that wipes out user data.
This is one of those bits of news that bears repeating, particularly if you use online banking. CNET is reporting about a new type of Trojan horse, known as URLZone, that is designed not to steal your login information for online banking sites, but rather to actually steal your money while you’re on the bank’s [...]
New York-based BrickHouse Security is not only dedicated to assisting the public and government with their security, safety, protection, covert surveillance and counter-surveillance needs, but they also want to offer peace of mind for our mobile environments as well.
Picture this: You live two and a half miles from your front gate, and you want to know who is entering or leaving your property; or you own a half million dollar mobile home that is kept at a storage facility, and you want to check in on it daily without actually driving to the [...]
I recently checked out the Facebook Fan Check Application on Facebook. It does some sort of calculation on your friend list and arranges your top 15 friends in a order and it looks like to me the order is in the amount of Facebook activity that you and your friends have. For example, my brother [...]
There’s a new Trojan horse computer virus that may affect Skype users. Although there aren’t any widespread cases of this Trojan actually impacting Skype users. According to Symantec Security Response: Trojan.Peskspy listens in the data traveling between the Skype process and the audio device, it gathers the audio independently of any application-specific protocols or encryption [...]