The release of new Apple product is always greeted with near hysteria and the Apple Watch is no different. The ability to buy goods by waving your wrist at a terminal is one of the features proudly touted by Apple, as is the technically tough security of its Apple Pay system. And certainly these are achievements to be acknowledged. But just how secure is it and how long will it be before some hacks it?
Biometrics as a means of unique identification is common place today and it’s going to be even more so as tomorrow becomes today. But how would you feel about having your DNA mapped and your network of veins and capillaries used to identify you? It might sound far-fetched but not as far as you think.
Industry reports can be as appetising as chewing on wet concrete. But two recently released missives from Infonetics and Verizon paint interesting if not alarming pictures; the growth of mobile malware is rapidly accelerating and the hacked credit card industry is worth more than the global trade in cocaine. Reading between the lines both reports point to a well-known but rarely voiced truism; you can only ever really rely on yourself because those charged with protecting our data, simply aren’t doing it.
There’s some very powerful spy software available for snooping on mobile phones. But nobody would spy on you would they? Well, bugging happens at all sorts of levels from political worthies to anonymous everyday people. If you find your mobile phone chewing through battery life or your data usage rockets skywards, these could be signs of snooping. And if not read on to become acquainted with snooping clues, in this age of mass surveillance they could be very useful.
Hardening your wireless network is always a good idea. It stops others from ‘leeching’ your Wi-Fi and also deters potential hackers. It’s also straightforward, doesn’t require technical knowledge and can be done in minutes. Read on for a few tips.
This infographic gives you the inside track on the scourge that is malware and even explains what botnets are; ranks of hijacked computers that among other things, send out malware. Read more
Some are really simple like clicking a few boxes, others require a little bit more effort, but you’ll be amazed at the difference.
Fancy a chat with a friend in Lithuania, catch up with the folks back home in Gdansk or check something new in Prague? Webcams are a great tool for communicating long distance, you can see who you’re talking to and gain a whole new dimension to online chats (even if it is slightly convex and everybody appears a bit round around the head). But, sorry to say if it’s on the internet, and webcams truly are, it’s hackable. And webcam hacking is the ultimate invasion of privacy… and there’s the horror.
Fed up with your once cool iPhone? Tired of your fading Android device? Want to switch but just the thought of moving your contacts, photos, tunes, apps, games and all those other things you have on your device leaves you feeling slightly crazed and twitchy? Don’t despair. It can be done and it won’t leave you feeling that plucking your hair out, one follicle at a time, is a less painful option.
You can say whatever you like about the internet but what you can’t deny is the vast repository of free ebooks it offers for avid readers. Hundreds and thousands of titles are available from deep tech to swooning romance and literary classics – and even free audio books. And here’s a list of twenty free ebook sites from the well-known and popular to the sometimes obscure and fringe.