You down with P2P? 10 tips to secure your mobile payment app

Peer-to-peer (P2P) mobile transactions are on the rise, thanks to a number of mobile payment apps available on the market. In this post, we’ll look at the security risks of using P2P payment apps and what users can do to protect themselves.
Catego… Continue reading You down with P2P? 10 tips to secure your mobile payment app

LoRa Is the Network

We’ve become used to seeing LoRa appearing in projects on these pages, doing its job as a low-bandwidth wireless data link with a significant range. Usually these LoRa projects take the form of a client that talks to a central Internet connected node, allowing a remote wireless-connected device to connect through that node to the Internet.

It’s interesting then to see a modest application from [Mark C], a chat application designed to use a set of LoRa nodes as a peer-to-peer network. In effect LoRa becomes the network, instead of simply being a tool to access it. He optimistically describes …read more

Continue reading LoRa Is the Network

Chrome Flaw Allows Sites to Secretly Record Audio/Video Without Indication

What if your laptop is listening to everything that is being said during your phone calls or other people near your laptop and even recording video of your surrounding without your knowledge?

Sounds really scary! Isn’t it? But this scenario is not onl… Continue reading Chrome Flaw Allows Sites to Secretly Record Audio/Video Without Indication