Don’t Apple Watch And Drive

image

One driver had to pay a $120 ticket. What for? He was using his Apple Watch while driving. Obviously, the police does not like to see you look for a favorite song while being stuck in traffic. So, what is the moral of this story? New technologies brought us new troubles?

One of the police officers was a little bit more thoughtful in this matter. His word of advice is that we have to catch up with the new devices in terms of appropriate laws and regulations. We do not want reckless drivers on our streets. However, we also do not want to pay a huge price for our precious cyber-pets.

For the time being there is no acceptable middle ground for both parties. We are pretty much convinced that the authorities are exaggerating. On the other hand, the police officers on the field believe that the new smart devices strongly contribute to the reckless and dangerous behavior behind the wheel.

It seems that we have to come up with a new series of smart devices, which will be safe-drive-friendly. Until then, we should think twice before pressing shining buttons while driving. We do not want for smart devices put us in the dumb situations, do we? Do not Apple Watch and drive!

Ericsson Connecting People

image

It is not a secret nor a surprise that for quite some time the busy little bees in the IT industry have been looking for a way to use our own body as a legitimate cyber tool. This is how, we have ended up with an unprecedented and overwhelming body implants invasion. Yet, that was not enough.

We have witnessed first-hand in both Hollywood and laboratories how the scientists are trying to find a new machine package for our brain and mind. The same result again. That is also not enough. Now, Ericsson plans to go even further with its groundbreaking Print Connected concept.

To make the long story short, Ericsson wants to use our bodies as the legitimate cyber tools. In other words, our body will serve as a conductor and connector at the same time. By touching the devices around us, we will be able to surf the Internet and communicate.

All of these sound lovely. Just as if it has been borrowed from some SF movie. On the other side, now it is the right moment to raise some eyebrows and ask questions about endangered privacy. We have every reason to believe that a little bit later is going to be too late.

Androidageddon

image

Is there such a thing as the Android Armageddon? Is it possible, in the first place? Well, you should not raise your eyebrows. We are not talking about the SF movie, but rather about the real life situation. So, what needs to happen in order to reach the cyber Armageddon requirements?

Believe it or not,  according to the numerous cyber security experts there is a high level probability that the unimaginable DDoS attack of epic proportions may easily hit Android infrastructure, any moment now. How can this be possible? Is this an exaggeration?

Well, the unprecedented development in the Android field represents a strong encouragement for all bad Android boys and girls. You have a mobile OS, which is predominant in more than 90% of all smart devices. In addition, we are talking about the billions of potentially vulnerable devices.

As you can see our cyber stage is set for the worst case scenario. You do not have to wait too long for the volunteers, who are eager to build their hacker’s fame on the ruins of once powerful Android empire. Are we going to just sit and wait for Android Armageddon to happen?  

What’s Your EarPrint?

image

If there is an eye-catching thing, do you accept a possibility of being attracted by an ear-catching stuff, as well? In addition, if there is a fingerprint security solution for your smartphone, they why there should not be an earprint security check for it, as well? So, what are we talking about?

Well, it is quite simple. Just let your imagination do all the hard work. Imagine a smartphone, which will automatically unlock itself as soon as you put it next to your ear. Would not that be a historic moment? We know what are smartphone addicts going to ask us next. How about you?

Is an earprint the same as a fingerprint, in terms of security, of course? Well, according to the scientists, our ears are as unique as our fingers, in terms of a printed signature they leave behind. Now, you get it. This can really be a cozy feature, which is easy, reliable, and safe to use.

Our hats off to the brilliant and innovative guys behind this solution. This can really be a turning point in the development of the next generation of modern smartphones. Be careful what kind of earrings you use, though. You already know why, don’t you? Your smartphone may not like it.

The Pessimistic Percentages

image

Here is a disturbingly disappointing news. For the seven percent of all Americans their smartphone is the only Internet source. This may seem as an acceptable figure at the first glance. However, when you take into consideration that we are talking about almost 20 million users, then you get our point.

So, what is that supposed to mean? The land, which gave birth to Apple and Google, limits the option of people less fortunate to earn less than $30,000 a year. They do not have any kind of the Internet at home. All they have and use is a smart device in the palm of their hands. No more. No less.

The sad thing in this story is that we have the third world Internet conditions for a significant number of people, who live in, the number one country out of all first world countries – the one and only USA. We can talk all day long about our fascinating progress, but all of that is actually in vain.

The proper access to the Internet with a decent connection speed is the very mirror of our current level of achievements. So, the moral of our dark-cloud-story is that the busy little US bees have to find a way to “wire” this mobile-Internet-nation. Until then do not brag around, because it sounds bad.

Cyber Killing – A Safe Feeling

image

What do you know a kill switch has done an amazing job in preventing the problematic epidemic of smartphone thefts. In the first place, we are talking about the iPhones. However, this should be a strong indication for the rest of the smartphone family. The things have changed dramatically.

Three biggest cities in the world of smartphones have become the safest places for your cyber pets. San Francisco has recorded a decrease of more than 40% in the number of stolen smartphones compared to the previous dark periods. New York is not too far away from it with the impressive 25%.

What to say about London and the unprecedented 50% of its theft decrease? The kill switch has changed it all. It simply does not make any sense stealing a smartphone, which is protected with a kill switch, does it? The smartphone empire has obviously found a way to strike back and ensure its wealth.

Our smartphones are safe and sound thanks to the kill switch. Now, we can kindly ask Apple, and Google if interested, to spread the field of cyber protection. We do not need a kill switch for the software itself, but we need something equally effective to make the hackers think twice before they strike.

Galaxy S(ecurity) 6

image

Here is a promise in the air. It is entirely up to you, whether or not you are going to fall for it. Among other shiny and memorable things and features the new Samsung Galaxy 6 is supposed to do something useful for our security and privacy, as well. Can you guess what could it possibly be? Do you dare?

For what is worth, your finger comes with a big secret. There is a serious rumor about the new and improved ID fingerprint scanner. All what it would be necessary for you to do in order to use it properly is to press the specially designed area. That is all. No left or right. No forward or back. Only a simple touch.

We.do not want to spoil the party, nor ruin your optimistic mood, but there is an unavoidable dark cloud in the Samsung’s Galaxy. You have probably heard that there is a way to hack this fingerprint scan technology. Apparently, there is a way you can take the pictures of a fingerprint in order to trick the system.

This is a nice initiative and an effort, which deserves some honest respect on our end. However, what is going to happen with the old enemy within? Who or what is going to protect us from the malicious things we cannot touch with our precious and sensitive fingers? How about that Samsung for a change?

The Older, The Better

image

It turns out that the busy little crime bees in the UK have their must-have phone models. Pay attention to our words. Mobile phones, but not the smartphones. Why? The so-called primitive and outdated mobile phones are simply perfect for someone, who does not want to be tracked by the police.

For these purposes, the old and once extremely popular Nokia models are literally priceless for the UK crime lords. They do not have any of the modern smartphone features, which allows anyone to locate and follow their owners. In addition, they do not have to worry about recordings or police spying.

In addition, there is one more specific characteristic, which makes them to be the number one choice for the criminals. When it comes to these grandpa phones, the battery can literally last for days. This can be a matter of free life or time in prison, for someone committing crimes on a daily basis.

What do you know, the UK criminals are obviously going back to the basics of mobile phones. This can be a great story with the fascinating educational potential for the makers of smartphones. It reminds us nicely, what the modern mobile phones are to be all about in their essence.

A Smartwatch On A Watch

image

You know how it goes, don’t you? The ignorance is the mother of all cyber troubles. We are so blindly focused on smartwatch performances that we are completely neglecting the serious threats and potential damages in this field. Are you confused, or maybe you think that we are exaggerating?

Who in the world would hack a smartwatch and why? Well, you should know better or at least think twice. When you attack a smartwatch, you are actually after the bigger target. A smartphone is something you are trying it to reach through a smartwatch. How? Communication is the key here.

What is that supposed to mean? You do not have to be a rocket scientist to know that your smartphone and smartwatch have to communicate and exchange tones of data almost each second, do you? This is exactly what the hackers are aiming at. This is the Achilles’ heel of modern smartwatches.

What can we do about it? It is not such a bad start to be fully aware of this serious danger. Now, we are ready to do something about it for real. We need to implement some effective measures in order to prevent that our data transfers are intercepted and misused. How hard could it be? Right?

Jailbreak IOS 8.1.2

image

Hold your horses, and be extremely careful about this one. Just because it is out there somewhere, it does not necessarily mean it is absolutely safe. We should be fully aware about two extremely dangerous things. On the one side, there is the dark side of the jailbreak’s moon. Who is responsible for it?

Well, who else then the hackers themselves. They give you something useful, just like this tool, but they also ask something in return. How about a secret door for an uninvited visit to your device, whenever they feel good about it. On the other side, there is an ever present instability danger.

When it comes to this one, there is not much you can actually do about it. Why? Who knows, what the jailbreak operation can do to your system’s stability. That is why this a tricky thing to do, and as a matter of fact, it has always been. So, what is the moral of our story? Have we learned something?

It all comes down to, you should better think twice that is our only advice. Really? Honestly, there is no other thing we can offer you. For what is worth, no one can. On the second thought, we feel guilty for sharing this one with you. Maybe, it is better for you not to be aware about all available options.