German engineers create a machine which can scan an object, destroying it in the process, then transmit it over the internet and recreate it anywhere in the world using a 3D printer. Could it be the first prototype of a teleportation machine?
German engineers have created a machine which can take a physical object, scan it, and re-build it in a new location. Because it is effectively an early prototype for a Star Trek transporter the group have called it "Scotty" after the chief engineer on the Starship Enterprise, who Captain Kirk was regularly seen to order: "beam me up". The machine scans small objects with a camera layer-by-layer.
Read morePersonal data protection has been one of the trending topics for the past few years. However, all people perceive it differently: someone thinks of governmental control, others do not want to become the victims of online frauds.
Being informed is being protected! Safeum Communications ehf. has released a new mobile application TOP Security! for you to stay tuned on the latest security news. You will learn about latest trends, threats, data leaks and vulnerabilities in popular applications and services. News, analysis, interviews and expert forecasts – we monitor the news and immediately share with you.
Read moreA pair of computer scientists based in Europe have found a security vulnerability in the iPhone 5 series of smartphones that could be exploited by malicious software and compromise a user’s personal information.
The security flaw relies on steganography—the practice of hiding a message within another message. It’s related to cryptography, but whereas cryptography is the concealment of a message’s contents, steganography hides the fact that a secret message is being sent at all. Classic examples include embedding a message in a digital photo. But the computer scientists involved in the iPhone exploit have also found ways to hide messages using the network protocols.
Read moreGoogle is planning to sell wireless phone service directly to consumers using the networks of Sprint and T-Mobile. If everything falls into place, Google Inc. could offer discounted wireless data plans that would pressure other major carriers to offer better deals and services or risk losing customers to a powerful rival.
More affordable plans, in turn, could bring more people online, something that Google is trying to do because it runs the Internet's dominant search engine and largest advertising network. The Mountain View, California, company would profit from a potentially larger audience for its services. Google also implants its services in its Android mobile operating system.
Read moreFrance design company Cicret aims to turn your arm into a tablet device promising a great future for wearables. Billed as "a tablet, but on your skin" the Cicret bracelet will project your phone onto the skin of your arm.
It will use a tiny 'pico projector' and eight miniature proximity sensors to replicate an image of your device screen on to your arm. Low energy Bluetooth will communicate with your mobile device. A Wi-Fi component will connect you to the network. It will have a vibrate function and a micro USB charging port. Touching your arm with your finger will interrupt one of the sensors and return the instruction back to the processor - the Cicret bracelet.
Read morePolice forces increasingly are taking advantage of the technology behind military equipment initially designed for combat. Sometimes, though, the police might be coy about which of these gadgets they use to protect and serve.
For a couple of years now, some police forces have been using a device that can determine whether a building is occupied – without having to enter the premises. However, this information only came to light when a police officer at a suppression hearing in a Denver court. It's entirely understandable that police forces would want to use the most updated equipment.
Read moreEnterprises spend a lot of money a year dealing with false positive cyber security alerts, which equals nearly a large amount of hours in wasted time. In a typical week, organizations receive an average of malware alerts; only 19% are deemed reliable – or worthy of action.
Security teams are unnecessarily consumed by activity that pose no threat to their data security, which can distract them from dealing with threats that can lead to compromise. Compounding the problem, respondents believe their prevention tools miss malware infections in a typical week. The longer malware goes undetected, the greater the risk of a breach.
Read moreThe move towards mobile banking and mobile financial services has created many benefits for both financial institutions and their customers.
However, in an attempt to better illustrate the risks in this area, RiskIQ has released data on the number of suspicious mobile apps being downloaded by Android users looking for banking and finance-related services. Branded malicious mobile apps come in the form of compromised versions of official mobile apps or mobile apps wrapped in branding. They imitate functionality consistent with a given brand and have been pre-installed with malware or data-stealing permissions.
Read moreA list of the most popular passwords of 2014 reveals that internet security continues to be far less important to most people than simple memorability - much to the frustration of security experts worldwide. SplashData compiles a list annually by collecting stolen data published by hackers throughout the year and analysing the passwords.
It excludes data from non-English speaking countries. During 2014, as in the year before, the most popular password was “123456”. In second place for the second year was “password”. Experts recommend using a password of eight characters or more, made up of lower- and upper-case letters, numbers and special characters.
Read moreChina mounted a cyberattack on users of Microsoft's Outlook email service, with the apparent goal of spying on their communications. People within China using email clients to connect to their Outlook, Hotmail or Live accounts were subjected to a "man-in-the-middle" attack in which the attacker tried to hijack what's normally a secure, encrypted connection.
The activist group believes this is the latest attempt by China to intercept and spy on communications that it can't easily monitor. Some users reported the attack when they saw error messages using email clients connecting to Outlook's servers via IMAP and SMTP, protocols used to send and receive emails.
Read moreAxarhöfði 14,
110 Reykjavik, Iceland