How can you harden a phone so more secure?

Securing your phone involves implementing a combination of physical security measures, settings adjustments, and behavioral changes. Here are some general tips to help you harden your phone and enhance its security: By following these tips, you can significantly enhance the security of your phone and reduce the risk of unauthorized access and data breaches. Keep… Continue reading How can you harden a phone so more secure?

Internet of Things: tech firms have become our digital landlords – but people are starting to fight back

Last Updated on 2 December 2023 by Daniel Guido Noto La Diega, University of Stirling From smart toasters to fitness collars for dogs, we live in a world where everything around us is gradually being connected to the internet and fitted with sensors so that we can interact with them online. Many people worry about… Continue reading Internet of Things: tech firms have become our digital landlords – but people are starting to fight back

Spyware can infect your phone or computer via the ads you see online – report

Last Updated on 22 September 2023 by Daniel Claire Seungeun Lee, UMass Lowell Each day, you leave digital traces of what you did, where you went, who you communicated with, what you bought, what you’re thinking of buying, and much more. This mass of data serves as a library of clues for personalized ads, which… Continue reading Spyware can infect your phone or computer via the ads you see online – report

The ‘internet of things’ is sending us back to the Middle Ages

Last Updated on 10 September 2023 by Daniel Joshua A.T. Fairfield, Washington and Lee University Internet-enabled devices are so common, and so vulnerable, that hackers recently broke into a casino through its fish tank. The tank had internet-connected sensors measuring its temperature and cleanliness. The hackers got into the fish tank’s sensors and then to… Continue reading The ‘internet of things’ is sending us back to the Middle Ages

What devices or things can hackers hijack?

Last Updated on 1 September 2023 by Daniel Hackers have the potential to hijack a wide range of devices and systems, particularly those that are connected to the internet or other networks. Here are some examples: It’s important to note that the range of devices and systems that hackers can target continues to evolve as… Continue reading What devices or things can hackers hijack?

To steal today’s computerized cars, thieves go high-tech

Last Updated on 15 August 2023 by Daniel Doug Jacobson, Iowa State University These days, cars are computer centers on wheels. Today’s vehicles can contain over 100 computers and millions of lines of software code. These computers are all networked together and can operate all aspects of your vehicle. It’s not surprising, then, that car… Continue reading To steal today’s computerized cars, thieves go high-tech

Liberate the tractors: the right to repair movement that’s regaining control of our devices

Last Updated on 1 July 2023 by Daniel Michael Stead, Lancaster University and Paul Coulton, Lancaster University The software that runs John Deere tractors was successfully “jailbroken” at this year’s DEF CON hacker convention, enabling farmers to repair or retune their equipment without engaging with the company that sold them their vehicles. The hacker involved,… Continue reading Liberate the tractors: the right to repair movement that’s regaining control of our devices