Opt-In Security V.s Forced Security
If I was to offer you the choice between one of two devices. The first device is completely customisable, allowing you to change almost any factor related to it. The second device has been...
If I was to offer you the choice between one of two devices. The first device is completely customisable, allowing you to change almost any factor related to it. The second device has been...
It’s been four years since the Pebble Smartwatch released in 2012, and people began flocking to the internet to be the first adopters of the technology. We can now truly say that we’re in the...
The Android Device manager (aka: Find My Android) is a great tool built into the Android OS that allows you to locate your Android phone from any web browser. There are several caveats for...
The Stagefright bug is once again hitting the news as Security researchers at NorthBit have developed a proof-of-concept Stagefright exploit, Metaphor, that reliably compromises Android phones. Tod Beardsley, Security Research Manager at Rapid7, comments: “Android is an incredible...
In early October Trey Ford, Global Security Strategist at Rapid7, came out with several points of view in regards to; Stagefright, handset life expectancy and ‘carrier-introduced delay ‘. He stated: “In June of last year, Google announced they...
Moto360: While other smart watches have come and gone the Moto360 remains as the smartwatch that balanced both good looks and functionality. Its sleek and simplistic design allows for it to blend into almost...
James Naylor, a security evangelist, performed a talk at infosec london yesterday. The talk was called ‘Securing the Mobile User: Have we Really Got it Right?’ It focused on the move to mobile and what...
So we’ve all been there, you’ve just updated to the newest model and want to keep the old one around but have no clue of what to do with it. This list will detail...
Malwarebytes Anti-Malware: Starting on the basics Malwarebytes is an app that will run in the background of your phone and search for malicious content like dodgy apps or files, this being just like the antivirus on...
Today we are going to be creating a simple ‘Hello World’ app (using ai2.appinventor.mit.edu) where the user presses a button and the words ‘Hello World’ appear on the screen. Simple right, so lets get...