Privacy and technology maintain a tenuous relationship, and the balance between convenient features and personal security is always one worth keeping in mind as users make the most of their devices' capabilities. To that end, Chainfire has released a new proof of concept app that aims to give users at least some peace of mind when it comes to the - for lack of a better term - trackability of their devices, specifically related to Wi-Fi.
People think that working from home as a freelancer is a great way to make a living. And most of the time it is - being able to complete a project at 4AM sans pants is something that rarely works in a cubicle. But when you're self-employed, all the burdens that are normally handled by an accounting department fall on you. That's where popular iOS app and recent Android pilgrim FreshBooks comes in.
If you're intrigued by the idea of wearable technology, but don't see the Pebble's appeal, or don't have the patience to wait for Google Glass or any of the other rumored wearable goodies coming from Apple, Samsung, or Google (depending on who you ask), Motorola's MOTOACTV, the fitness-tracking smartwatch, may be a good starting point.
The MOTOACTV, which debuted in 2011, is a smartwatch that positions itself as mainly a fitness tool, tracking your runs and slapping some maps and music on top of it for a nice experience.
When Jawbone's UP wristband was released in late 2011, I was excited. Then I was disappointed. The motion-tracking band seemed like a perfect step into wearable tech at the time, but its companion app wasn't available for Android. Whether and why Jawbone didn't see fit to invest resources in developing for Android was a mystery, but now – thankfully – it's immaterial. Just over a week ago, Jawbone released an official UP app to the Google Play Store, and I wanted to be first in line to try it out with Jawbone's updated 2012 wristband.
Now that Android has matured to the point of being solid in its own right, manufacturer skins don't rely so much on fixing the problems with the OS as they do creating their own platform. In order to differentiate from the competition, the new Galaxy S needs to do things the One series doesn't. While HTC focuses on improving its audio and visual performance, Samsung is attempting to boost its wow factor by improving on its eye-tracking technology.
Smartphones have a staggering amount of data they can monitor, and not just in terms of the Internet. Position, orientation, speed, sound, light, g-force, the list goes on - that's why academics are using them as self-contained sensor stations for cool stuff like blasting into space. If you need to monitor data remotely for decidedly less cool reasons (like seeing if your CDL contractor got four tons of gravel to the worksite without stopping at Arby's first) Valarm might be the right service for you.
For the uninitiated, 2Checkout is a web-based storefront service that allows users to both create an online checkout system for their products as well as handle merchant services like credit card payments. If you've ever tried to set up your own shop, you know how difficult it can be to get all the moving parts together. Now, 2Checkout is making it even easier with the release of its mobile app that will allow sellers to track sales, issue refunds, and even contact customers.
In the modern world, watching TV shows isn't what it used to be. Back in the old days (or the present for some), shows simply existed at a certain time and you tuned in when they aired, and then they were cancelled and then you never heard from them again. Today, though, it's not uncommon for most viewers to discover a show a few seasons in and then find their way through the backlog of episodes.
Over at Black Hat USA 2012, security researcher Ralf-Phillip Weinmann demonstrated a vulnerability in several Android devices that utilized A-GPS to send illicit messages to the device which could, he explained, be used to send a report of the device's location any time an A-GPS message was sent or even be used to gain complete control of the device.
In describing the attack, Weinmann pointed out that, for example, a malicious WiFi network could instruct a phone to relay all future A-GPS requests, even once the device has left the WiFi network's range.