Smash a wearable bracelet for tennis players allows them to record their movements and review them afterward on the Android or iPhone App. Currently Smash is in the prototype stage and requires a large sum of $200,000 AUD over the next month and a half. Smash founder Rob Crowder says that level of funding is […]
Blog
Can IBM detect fraudulent hackers with its new cognitive tool?
IBM is looking into a technology that can help detect and identify a fraudulent access of personal data stolen from its legitimate owner. The cognitive fraud detection system is especially useful to website developers and cloud providers that maintain logins and network access on a daily basis.
Google to phase out third-party add-ons for Chrome
In a far-reaching move to ensure that browser plug-ins and extensions finding their way into the Chrome world, Google reiterated and bolstered its plan to phase out third-party add-ons that do not comply with its goal.
Apple’s Find My iPhone feature vulnerable to ransomware schemes
The intended role of Apple’s Find My iPhone feature ends when your iPhone or iPad falls in the hands of nefarious scammers, as has been shown by a recent incident in Australia.
FBI cracks down webcam-spying malware called Blackshades
The idea of spying on Internet users through their webcams seems a no-brainer. And rightly so.
Touch ID: In All iPhones and iPads Shipped in 2014
The Touch ID was a revolutionary addition to the iPhone line-up when the iPhone 5S was released. Instead of having to click the home button, swipe to the right, and enter your passcode, Touch ID allowed iPhone 5S owners to access their iPhones simply by pressing their fingerprint to the touchpad.