With hacking so prevalent in the realm of cyber security, your accounts have become more vulnerable than ever. Companies do their best to protect you but there have still been significant password leaks recently. Having different passwords for all your accounts can make sure that, in the event of a leak, your other accounts aren’t compromised. Two step verification when you log on from a new device can also add another layer of security to your account. Lastly, try to avoid sites that don’t have a padlock symbol next to their web address in your browser. Sites that feature the padlock encrypt any communications you have with the site so that if any information is intercepted it will be unable to be deciphered. It’s impossible for you to make all your information completely secure online, but these steps can certainly help.
For the full story on Medium.com, click here
Why You Should Destroy Your Boarding Pass
The last security measure that comes to mind in air travel is properly discarding your boarding pass after your flight. Although, disposing it may be more important than you think. From just the QR code on your ticket, people can gain access to your name, frequent flyer number and your travel record. One of the biggest ways your boarding pass can pose a security threat is by posting it on social media. Not only does posting your pass allow potential burglars to know when you will be out of your house, but also releases some of your personal information onto the Internet. The best way to make sure your boarding pass information remains safe is by carrying the pass with you off the plane and tearing it up or shredding it at home or when you arrive at where you will be staying.
For the full story on Slate.com, click here
Hackers Can Control Siri from Over 10 Feet Away
Siri, the personal assistant on your iPhone, may also present a vulnerability for your phone when your headphones are plugged in. Recently, French researchers demonstrated that they were able to hack Siri using a radio transmission 16 feet away via the microphone on Apple headphones. The hack does not even require the person to speak, they can just transmit a frequency. This may not seem like that big of a deal until you realize the amount of things you can do via Siri. A hacker could use Siri to send your phone to a malware site or even eavesdrop on your conversations. Ultimately, the only real limitations to what a hacker can accomplish by exploiting this vulnerability are functions of your device that Siri is unable to access. To insulate yourself from this security attack, make sure that your Siri is not enabled for use while your phone’s screen is locked.
For the full story on Wired.com, click here
Is Ingestible Technology the Next Big Thing?
From the Apple Watch to Google Glass, wearable devices seem to be the direction modern technology is heading. Well the CEO of Jawbone, Hosain Rahman, says tech may be getting even wilder. Ingestible technology is not out of the realm of possibility. One of the challenges for wearable technology is the constantly changing style trends. A device that may work well in the winter under a sweater may not be as cool to show off in the summer months. One way to overcome this hurdle is by utilizing ingestible technology. Swallowable data trackers already exist in the health world to measure medical adherence. It has yet to be seen whether a similar device could be used to adjust the heat in your house based on your body temperature or something similar. More and more technology is becoming an extension of our bodies. It seems ingestibles are just another step on the pathway to future tech.
For the full story on Mashable.com, click here