smartphones
What’s the Most Secure Way to Lock Your Smartphone?

Smartphone owners today have a plethora of ways to lock and unlock their phones: face scans, finger presses, PIN codes, location detection, and so on. Are some of these options more secure than others? And which one should you use? Read More >>

adobe
Adobe is Finally Killing Flash (For Real, This Time)

Here it is, hiding halfway down the company’s latest press release, like a guillotine in a crowded town square: “Adobe is planning to end-of-life Flash.” Boom. That’s the sound of the blade dropping, and Flash, finally, thankfully, mercifully dying. Because Adobe just killed it. Read More >>

kodi
Your Illegal Kodi Plugins May Be Used Against You By Lawyers, Or Anyone Else

We all know by now that some people are using the Kodi Media Centre as a way to access illegal content. Some of these people use plugins that they download in repositories, collections of mini-apps, which can stream video from services online. There are IPTV plugins that stream Sky Sports, and others which can access on-demand TV stored in online "lockers". Read More >>

security
Sweden Leaks the Personal Information of Millions of Its Own Citizens

There are security fuck-ups and there are legendary security fuck-ups. This one clearly falls into the latter category. Swedish Prime Minister Stefan Lofven confirmed at a press conference on Monday that his administration potentially exposed the personal information of millions of Sweden’s citizens. Read More >>

security
TSB and Samsung Launch Iris-Scanning Account Logins

The subset of UK civilians that own a Samsung Galaxy 8 and have a TSB bank account are going to have a fun toy to play with this September, as the bank and the phone maker are teaming up to allow iris identification to access their account details. Read More >>

security
How Google Is Stopping Phishing Attacks from Unverified Apps

Google is stepping up its effort to block phishing attempts that use app permissions to gain access to users’ Gmail accounts. These phishing attacks invite users to grant an app permission to manage their Google account—which lots of safe apps do, too—and then exploit those permissions to take over an account or send spam. Read More >>

security
£2m up for Grabs in Government’s Anti-Terror Hackathon

The three-word brief summarising the government's new anti-terror competition is that it wants your methods of "improving crowd resilience" by whatever means necessary, as it looks to add yet more Orwellian colour to today's society by monitoring people and attempting to pinpoint potential troublemakers and neutralise them. Read More >>

privacy
US Border Officials Can Look On Your Phone But Cloud Data Is Out Of Bounds

As we rumble toward a future where owning any secret information is punishable by life in prison, there is some good news from the US. Border officials are allowed to look through your phone without a warrant (and without probable cause) but they aren't allowed to check your cloud data. Read More >>

encryption
Australia Looking To Ban Encryption, Claims Maths Doesn’t Apply Down Under

The Australian government is currently seeking the ability to inspect messages sent by its citizens, even if those messages are encrypted. Like the UK, the Australian government feels that it would be able to prevent more terror attacks if it could have a backdoor into people's messaging apps. The Australian Attorney General, George Brandis, has also claimed that British spooks at GCHQ have the ability to crack end-to-end encryption. Read More >>

apps
Secure Chat App Wickr Thinks it’s Solved the Encrypted Conference Calls Problem

Remember when encrypting stuff was really hard? It kinda drives me crazy to think about how much time I wasted trying to set up encrypted OTR chat on Adium a few years ago, and now we can just download Signal or WhatsApp or Messenger and bam! Our chats are encrypted, just like that. We can even have an encrypted group chat. We’re so cyber-spoiled these days. Read More >>

privacy
Uber Unveils New Privacy Tool That Protects Individual User Data

You might think of Uber as a ride-hailing company or a lawsuit-ridden self-driving car developer, but at its core, Uber is a big data company. It has to constantly crunch location coordinates, traffic data, payment information, and tax rates—and putting all that data in Uber’s hands sometimes makes users nervous. Read More >>

watch this
Even A ‘GigaGalactic Super Computer’ Would Take A Long Time To Crack 256-Bit Security

You've heard time and again that "256-bit" encryption is the bee's knees when it comes to security. But what does that even mean? Encryption is a topic that can be quite complex, though this educational video from 3Blue1Brown does an excellent job of visualising how hard 256-bit is to "crack". Read More >>

security
Government’s Holiday Horror Terror Advisory Inadvertently Promotes the ‘Staycation’

Older readers might remember the Cold War horror videos of the 1970s and early 1980s, which convinced a generation of seven-year-olds that the jet plane flying overhead was probably a nuclear bomb about to wipe out Bodmin and therefore their homes, turning them and the dog into dust. This generation's thing for children to be scared of? Overseas random terrorist gun attacks. Read More >>

security
Battery Explodes at Turkish Airport After Passenger Throws Power Bank During Security Spat

Throwing things out of anger is never a smart move, but it can also lead to more serious consequences. Especially when you’re at an airport and what you’re hurling at the ground is an explosion-prone lithium battery. Read More >>

phones
Hilton UK Tests Phones as Door Keys

The Hilton hotel chain is about to test using NFC-equipped smartphones as door keys, with a trial about to start in 10 of its UK properties -- and an ambition of getting around 100 wired up for it by the end of the year. Read More >>