Third-Party Gmail Applications

As of last year, Google pledged to stop collecting data from Gmail user’s inboxes to fuel targeted advertisements. However, this does not apply for the third-party developers that create apps and extensions for Gmail. Google claims that all third-party app developers and companies are examined before granting them access to the Gmail service, and that swift action is taken in any instances of poor or unclear practice from
-> Continue reading Third-Party Gmail Applications

The Danger of Selling Used Storage Devices

A recent study into used storage devices such as memory cards, USB sticks and Hard Drives has been conducted by The University of Hertfordshire’s Cyber Security Centre to see how often used storage devices is bought and sold containing personal data from the previous owner. The study involved purchasing 100 used storage devices from online
-> Continue reading The Danger of Selling Used Storage Devices

Google Home & Chromecast Vulnerability

Recent research into the security of Internet of Things (IoT) devices has uncovered an authentication vulnerability with the Google Home and Chromecast. By exploiting this vulnerability, an attacker can obtain the user’s geographical location, accurate to a 15-foot radius. Security Researcher Craig Young, who found the vulnerability, explains that the exploit requires the user to
-> Continue reading Google Home & Chromecast Vulnerability

Smart Locks

Tapplock is a popular, Bluetooth-based, fingerprint activated padlock. The speciality of this padlock comes down to the fingerprint recognition technology which allows users to unlock the padlock with their fingerprint or use a mobile application remotely. As an added benefit, you can even allocate trusted individuals who can also use the mobile application to unlock
-> Continue reading Smart Locks

Apple vs Facebook

It is a known fact that Facebook can track the activity of users via the comment fields and like & share buttons on posts regardless of whether you interact with those buttons. The Facebook like and share buttons are present on thousands of websites enabling Facebook to track users across multiple sites, revealing information about
-> Continue reading Apple vs Facebook

Sharenting

Sharenting is a relatively recent term being used to describe the overuse of social media by parents who are sharing too much information about their children in their social media posts. While it may just seem like the harmless act of proud parents, Barclays claims that sharenting is in fact the weakest link in risking online fraud and
-> Continue reading Sharenting

Gmail Self Destruct

Google has added an expiration feature to their Gmail service which allows users to set an expiration date for their sent emails, after which the email will be removed and permanently destroyed from the recipient’s mailbox. The self-destruct feature works by sending a link as opposed to an attachment or sensitive content written within the
-> Continue reading Gmail Self Destruct

Wi-Fi EasyMesh

Mesh networks make use of multiple Wi-Fi enabled routing devices to extend a Wi-Fi network across a much larger area, for example it is common for users who live in large houses to lose Wi-Fi signal due to the lack of range provided by a single Wi-Fi hotspot alone. The benefits of using a mesh
-> Continue reading Wi-Fi EasyMesh

How can smartphones help the fight against cancer?

Cancer Research is looking to harness the processing power of smartphones to assist research, by building up a network of 100,000 or more UK smartphones due to research progress being slowed by the lack of funding for and access to the much-needed super-computing resources. The project has been named DRUGS (Drug Repositioning Using Grids of
-> Continue reading How can smartphones help the fight against cancer?