Tagged: WiFi Trends

Protecting Your Identity with the Internet of Things

The internet of things—or IOT, as it’s commonly known—was once the stuff of science fiction, a newfangled “wave of the future” concept only experienced at futuristic demonstrations like the World’s Fair. But now many of these devices are already in use in millions of households around the world. They’ve become an interesting yet somehow still unknown entity in the world of technology, and industry experts have stated these products will be the norm just a handful of years from now.

Introducing DataCompress: A Data Savings App for your Mobile Device

Is your phone a data hog? If so, we have some good news. The makers of PRIVATE WiFi, have a new product on the market to help users improve their Internet experience. With the launch of DataCompress, Android users can cut their mobile data use by up to 50%*. This new app let’s you get the right-sized content, fast! This means using less of your plan as you get more value out of it.

Don’t Get Hacked At CES

It’s that time of year again – when more than 150,000 gadget geeks, techies and businesses from around the world descend on Las Vegas for the mother of all trade shows – the International Consumer Electronics Show. With over 3,200 exhibitors previewing and showcasing their high tech products, CES is the perfect place for tech enthusiasts to network. So you’d think it would be safe for attendees to connect their laptops and mobile devices to the event’s public WiFi hotspot.  But you’d be wrong. Like most big events, CES can be a hot spot for hackers.  If you’re going to be there, make sure you don’t become a target.

WiFi Footprint: Personal VPNs Endorsed as WiFi Hotspots and Autoconnect Functionality Proliferate

“WiFi footprint” is a simple term for a complex issue: the exploding pace of WiFi hotspot creation is not abating and soon a roamable, global alternative network will become our reality.

In a world seemingly saturated in WiFi, the notion of autoconnecting to these networks might seem appealing. However, whether using a laptop or mobile device, security threats remain a constant.

Are Phone Calls Over WiFi Hotspots Safe from Hackers?

You might have heard that the new iPhone 6 supports making phone calls over WiFi networks. Using WiFi networks to make calls is the next big thing for mobile phones.

But how safe is it to make phone calls using public WiFi hotspots? Are your calls being encrypted? And should you take any steps to protect yourself from WiFi hackers? Read on to find out more.

Will WiFi Replace Cable and Fiber Networks?

In a recent blog post, we mentioned that the next generation of WiFi technology will be much faster, and that by 2018, worldwide WiFi traffic will overtake wired traffic for the first time ever.

Now see how one Silicon Valley company plans to bring high-speed WiFi networks to underdeveloped parts of the U.S. as well as developing countries.

OpenSignal’s U.S. WiFi Study Looks at Speed, But Not Network Security

OpenSignal is a small startup with a very interesting mission: they are creating a database of WiFi access points around the world and are hoping to become the global authority on wireless networks. Their website contains analysis of all of the data they have collected, including the WiFi signal strength of all access points in a given area.

How do they do it?

One of NYC’s Free WiFi Providers Goes Kaput

Is New York City’s free WiFi program in trouble?

A research group known as Gotham City Research claims that Gowex, one of the five organizations that former New York City Mayor Bloomberg had chosen to provide free WiFi service in the city’s five boroughs, cooked their books and vastly overstated its earnings. Based on this report, Gowex filed for bankruptcy.

Mobile Threats: What You Need to Know About Mobile Payment Risks and Responsibilities

As we continue to rely on the precarious mix of mobile banking & payments, mobile apps, and public WiFi hotspots, it’s perhaps not such a surprise that online bank fraud is escalating. Quite a bit of this fraud is perpetrated by malicious apps that users inadvertently download on their mobile devices. App developers with malicious intent have become quite adept at concealing the surreptitious nature of these apps.