security

Doorbot evolves into Ring, looks less conspicuous

Doorbot evolves into Ring, looks less conspicuous

Doorbot is shedding of its somewhat industrial and rather geeky image, changing its name to a more generic-sounding Ring and looking more like a doorbell that can blend into your house's design. But more than just shedding off appearances and names, Ring, formerly known as Doorbot, picks up a few new tricks that turns the WiFi doorbell into a more well-rounded security system.

Continue Reading

Study shows we’ll give up our children for free WiFi

Study shows we’ll give up our children for free WiFi

When you’re logging into a public WiFi hotspot, do you read the terms and conditions? Probably not, but you’re not alone. While it’s not clear what percentage of people aren’t reading the fine print, quite a few Britons in London recently gave up their first-born child for free WiFi, all because they didn’t read the T&C when logging in.

Continue Reading

Apple Bash patches released for OS X

Apple Bash patches released for OS X

Apple has released patches for the bash security exploit, fixing a security flaw in the UNIX shell, though the company maintained that the issue did not affect most of its users. The three patches, released today, follow similar security updates for some of the best-known Linux distributions, after a potentially significant problem was identified earlier this month.

Continue Reading

Kickstarter “Nope”: a tiny magnet to protect your privacy

Kickstarter “Nope”: a tiny magnet to protect your privacy

Leaks, government spies, schools of dubious repute -- all potential ways your computer's webcam can be transformed into a portal of snooping. In light of the Edward Snowden leaks, many have felt the long-held and oft-dismissed habit of covering a webcam with tape maybe isn't quite as paranoid as it once seemed. It is, however, cheap looking. Nope, a successful Kickstarter, is looking to classy things up a bit.

Continue Reading

BASH bug leaves many web servers open to attack

BASH bug leaves many web servers open to attack

No, it's not the name of the bug itself nor is it a description of what you may do if you happen to be deeply affected by this security exploit. BASH, for Bourne Again SHell, is the most common command line (think, command prompt in Windows) shell in Linux and UNIX-like operating systems, which means that a bug like this leaves many computers connected to the Internet, like servers and even Macs, vulnerable to hijacking.

Continue Reading

1 2 3 4 5 Next