Engineer Makes 3D-Printed Key To Open Any Lock

Posted in 3D Printing,Security by Darrin Olson on September 2nd, 2014

3D Printed bump key to open any lockSome German engineers have revealed designs for 3D printing a “bump key” that they say can be used to break into common tumbler style locks. According to the engineers, using nothing but a photo of the lock and some software called Photobump, a working key can be created.

Bump keys are not anything really new, but the ability to produce a lock-specific bump key through 3D printing from a picture of a lock, well that’s pretty new. A bump key basically uses some force and some jarring of the lock to move the small pins in the tumbler into the correct position so that the lock will turn.

Check out the video below:

Beach Vault

Posted in Security by Tam Yue on June 9th, 2014

Beach VaultThis is creative genius.

We have all been to the beach with our bag of precious things; cell phone, camera, purse, wallet. And we worry about these “things” getting ripped off by someone while we are laying there basking in the sun or out in the water.

Bring on the Beach Vault. The Vault is a container that looks like that of a screw, which is actually very important to the functionality of this product. You don’t have to dig a hole, all you do is turn the Vault into the sand and it buries itself. You remove the lid and you can store all of your valuables inside. It is large enough to hold a tablet, two wallets, cell phones, keys and you will still have room left over. And not only that, the Vault is water tight.

Another amazing thing about …

Cloud-Connected Bike Lock

Posted in Security by Tam Yue on May 15th, 2014

skylockWe are sure all of you have seen the episode of the Big Bang Theory where Sheldon, Leonard, Raj and Howard send the internet signal around the world to turn on the lamp in their apartment, right? And when Penny asks “Why?” the answer is simple “Because we can.” Duh.

That’s what makes the cloud-connected bike so super cool among all the bike locks. Because Skylockcan. These guys have invented a solar powered bike lock that you control with your smartphone through the cloud. There is no key to lose, or as what happened to one of us here recently, no key can be broken off in the lock so you need to call the lock and key guy to come save the day. You can unlock it one of two ways, tapping in the key code, or you can …

Forever Lock Unpickable Bike Lock

Posted in Security by Darrin Olson on May 4th, 2014

Forever Lock Unpickable Bike LockSecuring your bike is always a challenge and a good bike lock is an important part. One of the challenges with key-based locks is of course someone just picking the lock. An inventor here claims to have created an un-pickable lock since the key chamber is simply not exposed. Just opening the lock is fairly complicated and we suggest just watching the video.

Microsoft Offers Researchers Money For Enhancing Windows Security

Posted in Microsoft by Reuben Drake on August 4th, 2011

Windows has had it’s share of vulnerabilities in the past, so now Microsoft is offering more than $250,000 in cash and prizes for contestants who can come up with new ways to mitigate exploits. Anonymous and LulzSec are out there after all, taking companies down.

Microsoft will pay $200,000 for the best “novel runtime mitigation technology designed to prevent the exploitation of memory safety vulnerabilities.” Two runners up will also receive $50,000 and a MSDN Universal subscription valued at $10,000. I’d say that is lots of incentive to come up with some new tricks, wouldn’t you?

Twitter gets more secure with HTTPS

Posted in twitter by Conner Flynn on March 16th, 2011

Twitter has just announced that they will be offering an optional “always on” HTTPS setting to its users. So if you use Twitter on unsecured internet connections like free public WiFi and are worried about people stealing your login details, you should be enabling the option on your Twitter settings page.

Enabling the HTTPS setting doesn’t force mobile browsers, so if you’re using the Twitter website on your phone, go to https://mobile.twitter.com/ for now. Also if you use a third-party client, check the settings to sure that it offers HTTPS.

Password problem on Amazon.com

Posted in Amazon by Conner Flynn on January 29th, 2011

It has been reported that there is a security flaw on the Amazon site that allows customers to log into their account without using their exact password. For example, if your password is PASSWORD, users can enter “password”, “passwordpassword”, “password12345″ to login to the account and it will still work.

This is apparently because the site still uses an old password encrypting technique that truncates passwords after the 8th character for some accounts that have kept the same password for many years. So users were not able to protect their accounts with passwords longer than 8 characters. However, Amazon has solved the problem – users just need to update their password, and it should automatically upgrade the password encryption.

Password Vault

Posted in Security by Conner Flynn on December 20th, 2010

The Password Vault stores and secures account information for website addresses, usernames, passwords, and ATM PINs, and allows immediate retrieval when you need them. Your passwords are safely stored offline in the vault’s memory, ensuring that the information can never be compromised. It can store up to 400 account records.

Sounds much safer than leaving passwords on notes around the house. The Password Vault holds all of your secret information behind its own password. And if the device is misplaced, lost, or stolen, five unsuccessful attempts to access your accounts will lock the device for 30 minutes. You can also reset it to erase all of your secret data.

Apple iOS 4 security breach gives complete access to your iPhone

Posted in Apple by Conner Flynn on August 3rd, 2010

Apple fanboys have long gloated about the “fact” that Apple users are safe and secure compared to PC users. It’s utter nonsense of course and here’s further proof. Owners of the iPhone, iPod touch or iPad need to be careful. Visiting a web page and loading a simple PDF file might actually set off a security bug that affects all iOS 4-powered devices.

All it requires is for the user to visit a web address using Safari, and the site will automatically load a simple PDF document that holds a font which hides a special program. When the IOS 4-powered device you are using displays the PDF file, the font will begin the stack overflow condition that allows embedded code in the font to gain full control of your device.

TSA says E-readers, Netbooks and iPads Can Stay in Their Cases

Posted in News by Darrin Olson on April 8th, 2010

TSA employee looks inside laptop bag.Blogger Bob with the TSA announced recently that electronic items smaller than the standard size laptop should not need to be removed from their bag or case when going through airport security. They didn’t say specifically what that standard size is, but did name a few items specifically that would fall below the size threshold have having to be removed, namely iPads, Kindles, Neos, Nooks, Sony Readers and Netbooks.

This certainly doesn’t mean that you don’t need to take things out of your bag if asked when going through security, but it is good news to hear since removing and donning all your gear again is sometimes tough enough.

TSA via Engadget

NewPCgadgets security case for iPad

Posted in iPad accessories by Conner Flynn on April 7th, 2010

You spent a lot on that new iPad, so you better keep it secure. And to do just that NewPCgadgets has introduced a new Security Case for the iPad. Now you can lock up that iPad and prevent others from using it without your permission.

This is the first locking case for the iPad and makes it look all businessy rather than stylish in my opinion. It’s available in black leather for $44.95. But looking at that design, I’m not sure it will keep any determined person away from your iPad for long.

Android Phone Fights Back at Thieves

Posted in News by Darrin Olson on January 10th, 2010

A mobile phone running Google’s Android software along with a third party security app was recently stolen in Oregon and was able to fight back against it’s captors, getting itself home again. The Motorola Droid was stolen out of a couples home late at night along with a number of other electronic items and things of values.

Shortly after stealing the device the thieves snapped a few photos of themselves with the on-board camera which, unknown to them, were then uploaded to a server as part of a backup process that runs each night. The owners were then able to download the photos from the servers website and turn them over to police which eventually led to the capture of at least one of the robbers.

The backup/security application was a free download for the Android phone called …

Wireless Encryption Mouse

Posted in Mouse by Conner Flynn on October 8th, 2009

Wireless Encryption MouseBrando has been busy building a more secure mouse. The Wireless Encryption Mouse makes it easy to secure sensitive data on your laptop. That’s because it features a “Folder Encryption” function, where folders can be encrypted on your PC, so that they can only be accessed when the mouse and wireless receiver is plugged in. That should keep your naughty pictures safe.

The Wireless Encryption Mouse is available in green, red, yellow and silver and works on the 2.4GHz wireless frequency with 1600dpi resolution. The Wireless Encryption Mouse will cost you $22.

Motion Detecting Telephone

Posted in Home by Conner Flynn on September 1st, 2009

Motion Detecting TelephoneYou are going away on vacation and you want to make sure that your home is secure while you are away. What do you do? I’ll tell you what, you just buy a old-fashioned phone and let it do all of the work. The motion detecting telephone can detect anyone walking in the room and can be set to dial a pre-set number when motion is detected. It also has a built in microphone that records sound in the room and sends it to your mobile phone.

It connects to the telephone wall port just like any other phone and will cost you $59.95. It’s useless to those with animals though as their movement will just have them calling you at all hours while you are away.

Microsoft addresses record 31 issues for patch Tuesday

Posted in Microsoft by Darrin Olson on June 10th, 2009

Microsoft releases 31 updates for Tuesday security patchesIn this weeks version of “Patch Tuesday” from Microsoft, the released security bulletin addressed a record count of 31 vulnerabilities across versions of Windows and Microsoft Office.

Of the updates a number of them were rated as “critical” and dealt with an issue of remote code execution through specifically designed web pages that were viewed through Internet Explorer versions 6, 7 and 8. This vulnerability, before the fix, would allow strangers to take control of the PC remotely through executing code in the browser.