Two months after introducing two-factor verification to its Premium account users, Evernote has made it available for all users. With this security feature enabled, you will need to enter your password along with a verification code sent to your mobile phone in order to log in to your account. What this means is that if someone gets a hold of your Evernote password, this nefarious individual would also need to be in possession of your phone to access your data.
To hide from the all-seeing eye of Sauron the NSA, you've got your anti-drone wardrobe: a metalized hoodie, a burqa, and a scarf.
But what about social media? How are you going to avoid the relentless gaze of Facebook and auto-tagging? Well, here's one idea: T-shirts designed to throw off face algorithms.
Why bother with boyfriend-vetting sites like ReportYourEx.com when you've got the ginormous spying resources of the NSA at your fingertips?
That seems to have been the thinking of at least one intelligence worker with the US National Security Agency, who, an NSA letter suggests, regularly tapped the agency's now-infamous phone-data collection program to screen people she met at cocktail parties and the like.
The overseas staffer "tasked the telephone number of her foreign-national boyfriend and other foreign nationals and...reviewed the resultant collection," the letter reads, adding later: "The subject asserted that it was her practice to enter foreign national phone numbers she obtained in social settings into the [NSA] system to ensure that she was not talking to 'shady characters.'"… Read more
One of the annoyances with any iOS upgrade or new iPhone purchase is signing back into apps that require you to be logged in to work. Most of the time, this is a simple process of remembering or looking up a password, entering it, and going about your day. If you tried signing into your Gmail account via the Mail app, however, you may have encountered this screen:
And after you carefully re-entered your password, making sure it was keyed in correctly, you again were met with the above note.
And after throwing your hands up in frustration, hopefully you … Read more
Celebrities can be really dangerous, and not just because they slap zebra print and rhinestones on any product they can get ahold of.
They also lure unsuspecting Internet users to sites that have tested positive for threats that can harm a computer or mobile device. But which athletes, musicians, comedians, and Hollywood stars are most likely to lure innocent Internetizens into the less-than-glamorous online underbelly of spyware, adware, spam, and viruses? Security software company McAfee recently released its 2013 Most Dangerous Cyber Celebrity list, which highlights the most common celeb search terms that expose Web users to no-good. … Read more
The subject of cell phone security haunts every major mobile player, but none so defiantly throws down the gauntlet to data thieves like the smartphone startup QSAlpha and its Quasar IV "cipherphone."
A self-funded project launched Tuesday through Kickstarter-like Web site Indiegogo, the Quasar IV runs on a security backbone of hardware encryption that promises to only share data -- e-mail, phone calls, and texts -- with others who have a "trusted" identity using the same Quasar IV smartphone.
While the cybersecurity specs command the show (and more on that later), the strangely named Quasar IV … Read more
Your carry-on luggage and electronics are already intimately familiar with airport X-ray machines. But just when you thought wait times couldn't get any longer, they may one day be subjected to another check: bomb-detecting lasers.
Researchers at Michigan State University have developed a low-energy laser that can pick up minute amounts of chemical explosives on luggage and clothing.
Doubtless we would all love to see raygun-wielding TSA staff, but the bomb-detecting light would probably be used in a conveyor-belt system. … Read more
Lego Mindstorms robots have been put to many good uses, such as solving Rubik's cubes and acting as a motorized wheelchair. Peter Purgathofer, an associate professor at the Vienna University of Technology, used Mindstorms to create a machine that automatically strips the DRM from Kindle e-books.
The DIY Kindle Scanner works by taking screenshots of each page of an e-book. The contraption holds the Kindle up in front of the camera on a laptop. The robot presses the "next page" button, takes a snapshot, and continues the process until it has captured a DRM-free version of the book.… Read more
Future authentication methods need to be a lot harder to hack. That's the idea behind the Nymi from startup Bionym. Instead of passwords, Nymi relies on your heartbeat.
The Nymi is worn as a bracelet. It monitors your cardiac rhythm, a unique signature for each person. It is constantly authenticating your identity as it wirelessly interacts with devices. You put it on once, it authenticates you, and it keeps going until it's removed. If another person tries to use it, it will detect the different rhythm and lock that person out.… Read more
Your camera is stolen. Drag an image you shot with the device into a Web page and a free service searches popular photo sites for other images taken with the camera. If the thief posted a picture taken with the camera to his or her personal account, he or she is busted.
Your laptop, smartphone, or tablet is stolen. Sign into your Dropbox or Gmail account and look for the most recent IP address used when accessing the account. If the service is set to log in to the account on startup, or if the thief tries to access your … Read more