Tagged: security

D-Link’s LTE Camera, McAfee Smart Home Router, and Covr Wi-Fi System

Podcast: EmbedSubscribe: Apple Podcasts | Android | RSSD-Link is showing off their latest wares at CES 2018 and has announced several new networking and connected home solutions, including a new router in partnership with McAfee that automatically protects connected devices on your home network. The D-Link AC2600 Wi-Fi Router is an all-in-one solution that includes D-Link’s high-performance dual-band 802.11ac router with MU-MIMO technology. This enhances network capacity and efficiency for users, while McAfee Secure Home Platform protects your devices connected to the network. On board is Intel’s Home Wi-Fi Chipset WAV500 Series, which will deliver amazing Wi-Fi connectivity to many devices at the same time, running a range of high-bandwidth applications. This router will protect you whether you are using it at home or for business and it will keep you safe. The company also announced two new wireless indoor/outdoor camera kits for home surveillance. The LTE Full...

Leeo Smart Alert Nightlight and Alarm Monitor

Podcast: EmbedSubscribe: Apple Podcasts | Android | RSSHome automation is valuable in not only keeping us safe, but informing us when something is wrong. Internet connected thermostats and detectors are great, but some of us rent as opposed to own. In those cases, we might be stuck in what we have. But it doesn’t mean we can’t be informed. Enter in the Leeo Smart Alert Nightlight. This is an Internet connected device that’s primary role is to illuminate your hallway, stairs, or another area of the house. But the nightlight is only one of the few cool things it does. First of all, let’s look at how easy it is to activate. Simply plug in the nightlight, then download the iOS or Android app. Connect via the peer-to-peer Wifi Leeo emits to configure this device and add to your home wireless system. The Leeo smart alert will then...

AirSig Password Wallet: Write in the Air to Authenticate, Open apps

Podcast: EmbedSubscribe: Apple Podcasts | Android | RSSWhen I pull out my phone I have to run the unlock code, find the app I want and open it up. AirSig has a better idea – Press a button and write Facebook in the air to open Facebook up. Air signature to even unlock the phone. Stating that everyone has a different writing style, AirSign uses the accelerometer to map out your writing style. After all – you sign your name different than others do. If the phone recognizes your signature then it can open up. Here is how it works – the user holds the phone similar to a pen. They push a button and air-write their name to unlock the phone. Different commands could open different apps. If you write Twitter in the air it will open up the social network. I got to see how it...

Nest Smoke Alarm Demonstration – SXSW 2014

Podcast: EmbedSubscribe: Apple Podcasts | Android | RSSI stopped by the Nest tent at SXSW to see the nest thermostat and smoke alarm in action. Nest makes home automation devices which can be controlled via smarphone or by hand. The Nest thermostat can help you adjust your heat or air, while the smoke alarm can detect smoke or carbon dioxide. The Nest fire truck was on hand to give the smoke demonstration. Notice how unnoticeable the smoke is when the alarm goes off. I have done this many times – I cook something which trips the alarm. When I move out of the kitchen, I finally notice the smoke that is actually in the room. The demonstration also showed me how to test the batteries and make sure the smoke alarm is functioning without having to get on a step-stool to do it. The batteries can keep your...

PrivacyStar: Block Phone Numbers from Calling – CES 2012

PrivacyStar: Block Phone Numbers from Calling – CES 2012

Podcast: EmbedSubscribe: Apple Podcasts | Android | RSSPrivacy Star blocks your phone numbers from any type of solicitors, including pollsters. The PrivacyStar app will control and monitor your mobile device. Smart Block will crowdsource the top 25 numbers, then block those numbers for the week. They also have a caller ID function, which will tell you who is calling. With the Do Not Disturb mode, all unblocked numbers will be forwarded to a custom text message. Most important, you can file a complaint if the caller is harassing you, right from the phone. This app is for Android or Blackberry users. iPhone launch will be Q2. They are also looking at VoIP solutions. Seven day free trial, $2.99 a month after (credit card or direct charge on phone). Interview by Andy McCaskey of SDRNews for the TechPodcast Network. [cessponsor]

Windows Mobile Viruses in the Wild

Windows Mobile Viruses in the Wild

When I got my T-Mobile Dash a couple of years ago, I toyed with getting an anti-virus program for it. After doing some research, I discarded the notion; although smartphone proof-of-concept viruses existed, there was no indication that there was anything in the wild for Windows or any other phone operating system. That is no longer the case. Reuters reports that two Windows mobile viruses hidden in games are in the wild affecting Windows smartphones. These are like those modem dialer viruses that were common before broadband became prevalent; they dialed premium phone numbers owned by the viruses spreaders, often in other countries, and made money by filling your phone bill with extra third-party charges. From the Reuters story: The games — 3D Anti-Terrorist and PDA Poker Art — are available on sites that provide legitimate software for mobile devices, according to John Hering, CEO of San Francisco-based...

Google Closing Windows? (Updated)

Google Closing Windows? (Updated)

According to Reuters, the Financial Times (the FT requires a subscription for regular users.) reports that Google is phasing out Windows for its standard-issue employee computers. The final straw seems to have been the Chinese hack attack in April. According to the reports, Google is trying to reduce its computer security hassles. The Reuters story notes The FT quoted one Google employee as saying: “We’re not doing any more Windows. It is a security effort.” Another said: “Getting a new Windows machine now requires CIO (chief information officer) approval.” Here is an excerpt from the actual FT story: “Many people have been moved away from [Windows] PCs, mostly towards Mac OS, following the China hacking attacks,” said another. New hires are now given the option of using Apple’s Mac computers or PCs running the Linux operating system. “Linux is open source and we feel good about it,” said...

Possible Twitter Security Flaw

Possible Twitter Security Flaw

Reuters is reporting that a security flaw in Twitter exposes users’ login credentials. It’s related to a known vulnerability in the Adobe Flash programming language. From the article: Adobe has told programmers how to address the vulnerability, which was first discovered in 2006, he added, but noted the operators of many websites have failed to respond to the warnings from Adobe. Some of the comments I’ve seen are wondering why Twitter hasn’t fixed this. I was starting to wonder why the flaw still exists in the Flash programming language, then I realized Adobe can’t be responsible for programmers’ not keeping up. I’m not an Adobe fan (I don’t use the Acrobat reader on any of my machines and I use Flash only because there’s not much point to surfing the web without it), but I have to say that Adobe has gotten a lot of undeserved bad press...

Cell Phones, Open Source, and Security

Cell Phones, Open Source, and Security

In his most recent Geekazine podcast, Jeffrey expressed some concerns about open source software on cellphones. I do not share those concerns. The issue is not open source; the issue is the Linux/Unix security model, which underlies the open source cell phone operating systems (“*nix” is sometimes used to refer to Linux and Unix to the extent that they have common traits). That model has proven itself far more secure than any of its competitors over the years.

Second Hand

Second Hand

Computer security. Not. From the Guardian. Highly sensitive details of a key US missile defence system have been found on the hard drive of a computer that was disposed of in California. (snip) The computer, which has been turned over to the FBI, was bought online as part of a global research project conducted by three universities – Longwood University in the US, Glamorgan University in the UK and Edith Cowan University in Australia – along with BT and Sims Recycling Solutions. Read the full story here. This wouldn’t surprise me if it had been a home computer from a home user. Most persons are more likely to read the user manual for their digital camera than to learn the basic care and feeding of their internet-connected computer. But a defense contractor? Give me a break.

Conflickerings

Conflickerings

The New York Times speculates on what the Conflicker worm is all about. Read the full story here: Speculation about Conficker’s purpose ranges from the benign — an April Fool’s Day prank — to far darker notions. One likely possibility is that the program will be used in the “rent-a-computer-crook” business, something that has been tried previously by the computer underground. Just like Amazon.com offers computing time on its network for rent, the Conficker team might rent access to its “network” for nefarious purposes like spamming. Make sure your Windows boxes are updated, your firewalls are secure, and your anti-malware programs are current.

Four Years in the Big House

Four Years in the Big House

A computer security consultant (has to be an irony there) got for years for creating botnets and was ordered to pay $19,000 in restitution. Read the story here.

LIVE Show 11-17-08 – i7, Martin Sargent for Yugo CEO and hackers

LIVE Show 11-17-08 – i7, Martin Sargent for Yugo CEO and hackers

Tonights show was another great one! We had a lot of friends show up and a bunch of new ones! Brokenshovel was getting a new motherboard, so we talked about the i7 that just came out. We also talked about Apple’s cores and AMD’s struggles. Someone came on the show concerned they were hacked. We talked about what an IP address does and what the person should do to be more secure. Finally, in hour #2 we found out that Jerry Yang, CEO of Yahoo! has decided to step down. We talked about who the successor should be. Larry Ellison from Oracle was suggested. I think the best person for the role is Martin Sargent. He has a lot of contacts and can make Yugo a young company again. All this and a lot more on the LIVE Show. Hour 1

Spam Bust Brings Spam Down – Is That A Good Thing?

Spam Bust Brings Spam Down – Is That A Good Thing?

No, I am not an advocate of Spam. I am an advocate of controlled email. If you ask for it, you should get it, but it doesn’t mean you should get your email shared for so called “3rd party” affiliates. For if they are no longer and affiliate, do they still have your email address? Last week McColo, a webserver known for trafficking of Spam, was taken down. The result was an instant drop of unsolicited email. IronPort – An E-mail security firm, said the problematic email dropped from 153 billion messages to 64 billion: A drop of over 60%. Other sites also reported a down spike in messaging. But is that a good thing?

LIVE SHOW – 6-16-08

LIVE SHOW – 6-16-08

Lots of cool stuff talked about: Ping.fm, myspace, Google, Security, Wii Fit, Facebook, Streaming Audio, Stickam, Blip.tv, blogtv and a lot more. Hour 1 Hour 2

Webware 100 Winners – Who won, and what’s new.

Webware 100 Winners – Who won, and what’s new.

Subscribe: Apple Podcasts | Android | RSS Subscribe: Apple Podcasts | Android | RSSWeb Apps.  Can we live without them anymore? What did we ever do without them? Webware put out it’s top 100 and we’re going to go through them and see what was good, what was bad, and what was… well, you know.. Webware is a site dedicated to watching what is popping up out on the internet. Any application that a web developer puts out will be checked out and reported on by this organization. It’s a good thing, too. There are so many out there, it’s tough to keep up. On April 21st, Webware put out the list of the top 100 apps. There were ten categories, each with ten winners. There were 5000 nominees, and 300 apps were chosen as finalists. Over 1.9 million votes were cast to dwindle this list down to...

Contest Rules

Contest Rules

Geekazine Giveaway Rules Official Rules The following are standard rules in any Geekazine contest. Unless otherwise stated in the individual contest, these rules will serve as a base. If you have any questions, feel free to contact me @geekazine Geekazine contests do not require a purchase to enter (unless otherwise stated). Eligibility: Geekazine Giveaways are open only to individuals who are legal residents of the fifty (50) United States (including the District of Columbia) and are 13 years of age or older. Employees of Geekazine are not eligible. Subject to all federal, state and local laws and regulations. Void in Puerto Rico and where prohibited by law. Agreement to Official Rules: Participant entry constitutes entrant’s full and unconditional agreement to and acceptance of these Official Rules and the decisions of the Sponsor, which are final and binding. Winning a prize is contingent upon fulfilling all requirements set forth...

Unlocked iPhones, EeePC, Total HD, Smartphone Security 11-26-07

Unlocked iPhones, EeePC, Total HD, Smartphone Security 11-26-07

T-Mobile has turned the tables in Germany by unlocking iPhones so the users can choose which service to use. This was to counter a restraining order by rival Vodaphone. But was that the best idea and more importantly, will that happen anywhere else? Let’s answer the second part first. Don’t expect this to happen anywhere else. And also don’t expect to get a German iPhone shipped to you – unless you are willing to head to Germany and pay $1500 for it.

Geekazine.com