Electronics

Open ports leave a hole in smartphone security

Open ports leave a hole in smartphone security

Smartphone apps that use “open ports” to share and receive data are more vulnerable to security breaches than previously thought, mainly due to the...
Diet tracker in space travel

Diet tracker in space travel

Whether you are on a diet or just want to be healthier, you might be one of those millions of people around the planet...
9 most popular fitness trackers that can optimize your health smartly 3

9 most popular fitness trackers that can optimize your health smartly

Fitness trackers have become a popular way to keep people active and healthy every day. While there are many brands available in the market, selecting...
Using truly secure passwords 6 essential reads

Using truly secure passwords: 6 essential reads

Passwords are everywhere – and they present an impossible puzzle. Social media profiles, financial records, personal correspondence and vital work documents are all protected by...
Is the new iPhone designed for cybersafety

Is the new iPhone designed for cybersafety?

As eager customers meet the new iPhone, they’ll explore the latest installment in Apple’s decade-long drive to make sleeker and sexier phones. But to me...
Fitness trackers could benefit from better security, study finds

Fitness trackers could benefit from better security, study finds

The security of wearable fitness trackers could be improved to better protect users' personal data, a study suggests. Vulnerabilities in the devices - which track...
Why do phone batteries sometimes explode

Why do phone batteries sometimes explode?

Lithium-ion batteries have become a ubiquitous part of the digital revolution, but not without a serious setback. They keep spontaneously exploding, and consumers are getting...
To Improve Smartphone Privacy, Control Access to Third-Party Libraries

To improve smartphone privacy, control access to third-party libraries

Just 30 libraries account for more than half of sensitive data taps Smartphone apps that share users' locations, contacts and other sensitive information with third...
The only safe email is text-only email

The only safe email is text-only email

It’s troubling to think that at any moment you might open an email that looks like it comes from your employer, a relative or...
The ‘internet of things’ is sending us back to the Middle Ages

The ‘internet of things’ is sending us back to the Middle Ages

Internet-enabled devices are so common, and so vulnerable, that hackers recently broke into a casino through its fish tank. The tank had internet-connected sensors measuring...