Get popcorn for iOS 13’s privacy pop-ups of creepy Facebook data grabs

Privacy-minded changes to smartphone operating systems which foreground the background activity of third party apps are helping to spotlight more of the surveillance infrastructure deployed by adtech giants to track and profile human eyeballs for profit. To wit: iOS 13, which will be generally released later this week, has already been spotted catching Facebook’s app […]

Continue Reading →

Urbvan raises $9 million for its private shuttle service in Mexico

As cities in emerging markets grapple with increasingly traffic-clogged and dangerous streets, Urbvan, a startup providing private, high-end transportation shuttles in Mexico, has raised $9 million in a new round of financing. Co-founded by Joao Matos Albino and Renato Picard, Urbvan is taking the reins from startups like the now-defunct Chariot and tailoring the business […]

Continue Reading →

Sonos Bluetooth-enabled, battery-powered speaker leaks ahead of official launch

Sonos has an event coming up at the end of the month to reveal something new, but leaks have pretty much given away what’s likely to be the highlight announcement at the event: A new, Bluetooth-enabled speaker that has a built-in battery for portable power. The speaker originally leaked earlier this month, with Dave Zatz […]

Continue Reading →

The ClockworkPi GameShell is a super fun DIY spin on portable gaming

Portable consoles are hardly new, and thanks to the Switch, they’re basically the most popular gaming devices in the world. But ClockworkPi’s GameShell is something totally unique, and entirely refreshing when it comes to gaming on the go. This clever DIY console kit provides everything you need to assemble your own pocket gaming machine at […]

Continue Reading →

This hacker’s iPhone charging cable can hijack your computer

Most people don’t think twice about picking up a phone charging cable and plugging it in. But one hacker’s project wants to change that and raise awareness of the dangers of potentially malicious charging cables. A hacker who goes by the online handle MG took an innocent-looking Apple USB Lightning cable and rigged it with […]

Continue Reading →

With warshipping, hackers ship their exploits directly to their target’s mail room

Why break into a company’s network when you can just walk right in — literally? Gone could be the days of having to find a zero-day vulnerability in a target’s website, or having to scramble for breached usernames and passwords to break through a company’s login pages. And certainly there will be no need to […]

Continue Reading →

Startups BRCK and Swvl partner on free WiFi for Kenyan ride-hail buses

Nairobi based internet hardware and service startup BRCK and Egyptian ride-hail venture Swvl are partnering to bring WiFI and online entertainment to on-demand bus service in Kenya. BRCK will install its routers on Swvl vehicles in Kenya and run its Moja service, which offers free public WiFi—internet, music, and entertainment—subsidized by commercial partners. Founded in […]

Continue Reading →

The PureCam Connected Car Security System is a dashcam with extras

Thanks to a rash of YouTube videos of traffic stops, wild crashes, and wacky antics, dashcams are becoming more and more popular with drivers. But does the world need one that shoots at 1080p and beams every minute of your drive back to a central storage device and can work as a Wi-Fi hotspot? PureGear […]

Continue Reading →

iOS 13: Here are the new security and privacy features you might’ve missed

In just a few weeks Apple’s new iOS 13, the thirteenth major iteration of its popular iPhone software, will be out — along with new iPhones and a new iPad version, the aptly named iPadOS. We’ve taken iOS 13 for a spin over the past few weeks — with a focus on the new security […]

Continue Reading →

Flaws in hospital anesthesia and respiratory devices allow remote tampering

Security researchers have found a vulnerability in a networking protocol used in popular hospital anesthesia and respiratory machines, which they say if exploited could be used to maliciously tamper with the devices. Researchers at healthcare security firm CyberMDX said that the protocol used in the GE Aestiva and GE Aespire devices can be used to […]

Continue Reading →