Tutorials
 
How to hack
 
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
 
Hacker hands
 
password typist
 
virtual private network (VPN)
Hacked’s Wiki
CCN.LA
Trending Topics
Cybersecurity
Hacking
ransomware
Bitcoin
Darknet
Vulnerabilities
visa
Posts Tagged ‘Berkeley’
Most Recent
 
Read More
September 24, 2016

Dot: Precision Tracking Hardware Makes Your Smartphones Smarter

A team of five Berkeley engineers has developed a new hardware product that utilizes precision location tracking to make smartphone notifications highly intelligent and contextual.

In the technology-minded world that we live in it’s nearly impossible to walk down the street without encountering someone on their phone. However, with the amount of information that we store in our phones it can be difficult to filter out what’s important and what’s not.

This is where Dot enters the scene.

Developed by startup Iota Labs, Dot is a physical push notification that informs your smartphone where you are so that it can determine your patterns and behaviors in the [...]

15984
Tutorials
 
How to Hack
 
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
 
Freeware
 
Malware
Press Releases
 
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
 
SecurityScorecard Announces Data Science Partnership with Columbia University