wearable tech
Connected medical devices brought security loopholes mainstream
The increasing demand for self-health management, coupled with the digitalization of the modern healthcare ecosystem, translates into a medical connected devices market that …
The way Bluetooth devices ‘talk’ to apps leaves them vulnerable
Mobile apps that work with Bluetooth devices have an inherent design flaw that makes them vulnerable to hacking, a research has found. Where is the issue? The problem lies in …
Consumer spending on technology forecast to reach $1.69 trillion in 2019
Consumer spending on technology is forecast to reach $1.69 trillion in 2019, an increase of 5.3% over 2018. Traditional technologies still dominate According to the latest …
Seven key digital disruptions CIOs may not seeing coming
Gartner revealed seven digital disruptions that organizations may not be prepared for. These include several categories of disruption, each of which represents a significant …
Fitness app Polar Flow reveals home addresses of soldiers, spies
Polar Flow can reveal sensitive information about the lives of users, including intelligence agents, embassy workers, military men and women, workers at nuclear weapons …
Security, privacy issues we need to solve before non-medical implants become pervasive
The cybernetic revolution is happening, and it’s imperative that civil liberties and privacy issues are addressed by system designers, innovators, regulators, and …
Camera-based, single-step two-factor authentication resilient to pictionary, shoulder surfing attacks
A group of researchers from Florida International University and Bloomberg LP have created Pixie, a camera-based two-factor authentication system that could end up being a …
Privacy, security concerns grow for wearables
While Google Glass was not the success Google wanted it to be, there is no doubt that the wearable camera market is growing. People may have not been comfortable with the fact …
Use a smartwatch to verify handwritten signatures and detect forgeries? Sure!
A new system that uses smartwatch devices and software to verify handwritten signatures and detect even the most skilled forgeries has been developed by Ben-Gurion University …
Unlocking Windows 10 PCs with smartphones, wearables, smart cards
With Windows 10, Microsoft is slowly moving towards removing passwords as the main authentication method for users to log in to their (locked) computers. Windows Hello, the …
A password for your eyewear computer: The sound of your skull
Could the unique frequency response your skull makes when hit with an ultrasonic signal be a good way for authenticating yourself to an eyewear computer (e.g. Google Glass, or …
Apple updates its products, fixes iMessages zero-day
On Monday Apple has pushed out updates for its many products: iOS, OS X, OS X Server, Safari, watchOS, tvOS, and Xcode. Of these, the most eagerly awaited was that for iOS, as …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments