Smart Devices Can Be Hijacked to Track Your Body Movements And Activities Remotely

Smart Devices Can Be Hijacked to Track Your Body Movements And Activities Remotely
If your smartphones, tablets, smart refrigerators, smart TVs and other smart devices are smart enough to make your life easier, their smart behavior could also be leveraged by hackers to steal data, invade your privacy or spy on you, if not secured properly.One such experiment has recently been performed by a team of student hackers, demonstrating a new attack method to turn smart devices into spying tools that could track your every move, including inferring sexual activity.Dubbed CovertBand…
Rate this blog entry:
Continue reading
119 Hits
0 Comments

Snoppa M1, First Take: Crowdfunded smartphone stabiliser off to a shaky start

Snoppa M1, First Take: Crowdfunded smartphone stabiliser off to a shaky start
The Snoppa M1 is a three-axis stabiliser for smartphones which uses similar technology to that employed in drones to deliver professional-looking steadycam video recordings.Well that's the idea. If you buy one expecting magically smooth, 'magic carpet' recordings as you walk down the street, akin to what you get from a gimbal-stabilised drone, you're going to be disappointed. It doesn't dampen your walking, so you'll still have the image bobbing up and down.But disappointment see…
Rate this blog entry:
Continue reading
180 Hits
0 Comments

Artificial neural networks decode brain activity during performed and imagined movements

Artificial neural networks decode brain activity during performed and imagined movements
As you were browsing www.sciencedaily.com something about your browser made us think you were a bot. There are a few reasons this might happen: You're a power user moving through this website with super-human speed. You've disabled JavaScript in your web browser. A third-party browser plugin, such as Ghostery or NoScript, is preventing JavaScript from running. Additional information is available in this support article. After completing the CAPTCHA below, y…
Rate this blog entry:
Continue reading
503 Hits
0 Comments

Asus debuts iPhone 7 Plus-style dual cameras in lower cost ZenFone 4s

Asus debuts iPhone 7 Plus-style dual cameras in lower cost ZenFone 4s
The ZenFone 4 Pro, with a blended metal-glass body, is at the top of the new lineup. Image: Asus Asus clearly doesn't believe that the dual camera on the iPhone 7 Plus and OnePlus 5 should only be available on premium smartphones.The company has taken the wraps off six new 5.5-inch display handsets, from entry level to premium, each with a rear dual phone camera. All …
Rate this blog entry:
Continue reading
130 Hits
0 Comments

Lenovo shows traction with data center revamp as PCs and mobile squeezed

Lenovo shows traction with data center revamp as PCs and mobile squeezed
Lenovo's revamp of its data center product line and sales and marketing efforts appear to be gaining traction even as the company's grip on the PC market slips and mobile reports operating losses. In the company's first quarter earnings results, Lenovo said its data center unit showed revenue growth of 11 percent in Western Europe and 8 percent in North America. Lenovo's data center business had been shrinking in recent quarters, but the company said…
Rate this blog entry:
Continue reading
174 Hits
0 Comments

Android Trojan Now Targets Non-Banking Apps that Require Card Payments

Android Trojan Now Targets Non-Banking Apps that Require Card Payments
The infamous mobile banking trojan that recently added ransomware features to steal sensitive data and lock user files at the same time has now been modified to steal credentials from Uber and other booking apps as well.Security researchers at Kaspersky Lab have discovered a new variant of the Android banking Trojan called Faketoken that now has capabilities to detect and record an infected device's calls and display overlays on top of taxi booking apps to steal banking information.Dubbed Fak…
Rate this blog entry:
Continue reading
265 Hits
0 Comments

ASU, Amazon partner to offer Echo Dot to 1,600 engineering students

ASU, Amazon partner to offer Echo Dot to 1,600 engineering students
Arizona State University engineering students are offered an Echo Dot as part of a voice-technology program. (Image: File photo) Arizona State University will offer engineering students living in its new, high-tech dorm an Amazon Echo Dot in a "first of its kind" voice-technology program. Amazon donated 1,600 Echo Dots to the program. Students moving int…
Rate this blog entry:
Continue reading
144 Hits
0 Comments

Latest Apple Watch 3 rumors: LTE option but no calling, Q4 2017 launch

Latest Apple Watch 3 rumors: LTE option but no calling, Q4 2017 launch
The Apple Watch 3 is expected to carry a similar design to the Apple Watch now available. (Image: CNET/CBS Interactive) While the Apple Watch 3 has previously been reported to feature LTE connectivity, the smartwatch is likely not to feature support for direct phone calls, according to often correct KGI Securities analyst Ming-Chi Kuo. …
Rate this blog entry:
Continue reading
229 Hits
0 Comments

Loans Applications? New techniques to measure social bias in software

Loans Applications? New techniques to measure social bias in software
As you were browsing www.sciencedaily.com something about your browser made us think you were a bot. There are a few reasons this might happen: You're a power user moving through this website with super-human speed. You've disabled JavaScript in your web browser. A third-party browser plugin, such as Ghostery or NoScript, is preventing JavaScript from running. Additional information is available in this support article. After completing the CAPTCHA below, y…
Rate this blog entry:
Continue reading
557 Hits
0 Comments

Two Critical Zero-Day Flaws Disclosed in Foxit PDF Reader

Two Critical Zero-Day Flaws Disclosed in Foxit PDF Reader
Are you using Foxit PDF Reader? If yes, then you need to watch your back.Security researchers have discovered two critical zero-day security vulnerabilities in Foxit Reader software that could allow attackers to execute arbitrary code on a targeted computer, if not configured to open files in the Safe Reading Mode.The first vulnerability (CVE-2017-10951) is a command injection bug discovered by researcher Ariele Caltabiano working with Trend Micro's Zero Day Initiative (ZDI), while the second…
Rate this blog entry:
Continue reading
200 Hits
0 Comments