The password-based security model at present has been constantly besieged by a string of cyber attacks that come in the form of brute-force and persistent password guessing. That is why many key players in the industry keep working to transition the online identity security infrastructure to more sophisticated models such as biometrics and other methods. […]
Blog
Martian Notifier Review – A Smartwatch with Classic Design
I’ve never been a fan of smartwatches and even after Apple announced the sleek Apple Watch, it still can’t convince me to spend a few hundred bucks to buy one. The most recent smartwatch I used is the Martian Notifier, there is a lot of things to love in this watch but can it become […]
HTC may unveil Nexus 9 on Wednesday; Company revives tablet business line
HTC’s global market share in the smartphone arena is obviously running short of breath in competition with giant rival Samsung and other players, so the company has been rumored to be pinning its hope for a rebound on a tablet: the Nexus 9.
Free webinar: Learn the Strategies and Techniques used to build Smart, Connected Products
The Internet of Things is emerging, but few people realize that it has existed now for decades. Room 5 is one of the pioneering companies who have been working with the Internet of Things since the very beginning. As IoT experts, Room5 is a trusted source of information and will be sharing their knowledge with […]
Despite strong encryption, human factor remains the weakest link in iOS 8 security
Apple has recently bolstered the encryption in new updates to the iOS 8 operating system in such a way that nobody, not even the law enforcers or Apple itself, could break into the security boundary. It sounds as though it’s a tough job decrypting iOS 8 data. Fortunately for hackers and law enforcement agencies alike, […]
Long-standing vulnerability threatens 45% of all Android devices
Over the past month, Rafay Baloch, a security researcher, has been investigating two lingering vulnerabilities in the built-in Web browser of Android devices, and security vendor Lookout conducted a study that indicates an alarming data: nearly half or 45 percent of devices running Google’s mobile operating system are susceptible to the flaw.