Privacy technologies
fromwww.theguardian.com
2 days agoWhat is a passkey, how does it work and why is it better than a password?
The UK's National Cyber Security Centre recommends using passkeys instead of passwords for secure digital logins.
The Chipolo x Secrid Miniwallet Trackable is tailor-made to suit Chipolo's Card tracker and accentuate all of its positives. The tracker sits on the back of the wallet, with the Find button accessible from the outside to make it easier to find your phone.
If you take mobile security seriously (and you should), then you might want to consider file encryption. This is all about encrypting files that you can either leave on your device and view when needed or share with others, knowing they can be viewed only by the recipient.
The new feature, called Digital Home Key, will live inside Samsung Wallet and is powered by the Aliro smart home standard. The new standard uses near-field communication (NFC) for its tap-to-unlock technology. It also supports ultra-wideband (UWB), giving users the ability to unlock their door as they approach and without pulling out their phone.
Need to lend your neighbor your car? The newest version of the digital key specification allows vehicle owners to text a copy of the key to other people. Last month, over a dozen automobile and smartphone manufacturers gathered in Palo Alto, California, for the 16th annual "Plugfest," hosted by the Car Connectivity Consortium (CCC) to test out the latest in digital key technology.
Owners of older Rivian R1S and R1T EVs will soon have the ability to remotely control their cars without having to use their smartphones or physical keys. That's because the latest Rivian smartphone app for Apple iPhones, version 3.9, will add an Apple Watch companion app that will enable owners of the 2021-2024 R1T and R1S to lock, unlock, and drive their cars.
The $140 Lock Ultra works just like other retrofit smart locks if you're using it with a typical deadbolt. You swap it for the indoor thumb turn portion, and Bob is, as they say, your uncle. Where it differs is that for $20 more, it comes with an adapter kit that lets it work with jimmy-proof and mortise locks the same way the original SwitchBot lock worked with normal deadboltsrather than replacing your lock hardware, it slips over it and operates it for you.
Vulnerabilities discovered by researchers in Dormakaba physical access control systems could have allowed hackers to remotely open doors at major organizations. The security holes were discovered by experts at SEC Consult, a cybersecurity consulting firm under Atos-owned Eviden, in Dormakaba's Exos central management software, a hardware access manager, and registration units that enable entry via a keypad, fingerprint reader, or chip card.
Meanwhile, the actual threat landscape evolved in an entirely different direction. Today's attackers aren't sitting at keyboards manually typing password guesses. They're running offline brute force attacks with dedicated GPU rigs that can attempt 100 billion passwords per second against hashing algorithms like MD5 or SHA-1. At that speed, your clever substitution of "@" for "a" buys you microseconds of additional security.
I'm blown away that I can write data to a little chip and then access that using a phone or tablet. I've embedded NFC tags into all sorts of things, from documents to business cards to 3D-printed objects. And it's easy! What you'll need You need two things: NFC tags: These come in all sorts of shapes and sizes, from to to .
An FBI informant helped run the Incognito dark web market and allegedly approved the sale of fentanyl-laced pills, including those from a dealer linked to a confirmed death, WIRED reported this week. Meanwhile, Jeffrey Epstein's ties to Customs and Border Protection officers sparked a Department of Justice probe. Documents say that CBP officers in the US Virgin Islands were still friendly with Epstein years after his 2008 conviction, illustrating the infamous sex offender's tactics for cultivating allies.
On one end of the tracker you'll find an integrated metal loop that can be attached to a keyring or clipped to a carabiner without the need for an extra case. The Xiaomi Tag is compatible with both Apple's Find My and Google's Find Hub tracking networks and mobile apps, but not at the same time.
CVE-2026-1470 (CVSS score: 9.9) - An eval injection vulnerability that could allow an authenticated user to bypass the Expression sandbox mechanism and achieve full remote code execution on n8n's main node by passing specially crafted JavaScript code CVE-2026-0863 (CVSS score: 8.5) - An eval injection vulnerability that could allow an authenticated user to bypass n8n's python-task-executor sandbox restrictions and run arbitrary Python code on the underlying operating system
Originally developed by Nest (before the Google acquisition), Thread has existed since 2011. Devised as a power-efficient mesh networking technology for internet-of-things (IoT) products, Thread gathered pace after the 2014 formation of the Thread Group, which develops the technology and drives its adoption as an industry standard. Founding members like ARM, Samsung, Google, and Qualcomm have been joined by Apple, Amazon, and many other big companies over the years.
All smart homes are at risk of being hacked, but it's not a likely event. The type of bad actors that target smart homes and devices, such as security cameras, are opportunistic. They search randomly for easy targets -- they don't tend to choose a particular home to attack and then try to circumvent that specific system.
In the age of smart fobs and transponder chips, losing your keys isn't just a minor inconvenience; it can feel like a high-tech lockout from your own life. When the realization settles in, the clock starts ticking. Your first instinct might be to call the dealership, but that often leads to a massive towing bill and a multi-day wait for parts.
Passwords get hacked all the time, but they can't be hacked if they don't exist...this allows a small team like 404 to spend less time managing security administration, and more time investing in bringing you stories you care about.
Home security has become a growing concern for UK households, and in 2026, many homeowners are taking a closer look at something that's often overlooked: their door locks. While alarms, cameras and lighting tend to dominate conversations around home security, experts are increasingly pointing to door locks as one of the most important - and vulnerable - parts of a property's defenses. As burglary methods evolve and older hardware struggles to keep up, upgrading door locks is quickly becoming a priority rather than an afterthought.
We live in a time where privacy is something we actually have to work to enjoy. Achieving a level of privacy we once had takes work, and you need to start thinking beyond a single desktop, laptop, tablet, or phone -- all the way to your LAN. Before I scare you all off, understand that this starts on the desktop and extends to the LAN. By beefing up both your devices and your network, you'll achieve a level of privacy that you wouldn't otherwise have.