HP Sure View Blocks Prying Eyes

...

Hackers don't need high-tech digital coding tools to steal your identity—they just need decent eyesight.

The new phenomenon of "visual hacking" means anyone at a nearby Starbucks table or library desk can poach information from your computer screen. So HP Sure View is a new 3M-developed feature for the HP EliteBook 1040 and 840 laptops that's intended to protect against visual hacking with the press of a button.

Tap the F2 key to transition into privacy mode, which reduces up to 95 percent of the screen's visible light when viewed at an angle, making it difficult for anyone other than you to read the display.

"The addition of HP Sure View to our PC security solutions helps address the risks associated with visual hacking and gives customers the freedom to work more confidently and productively in public spaces with the touch of a button," Alex Cho, vice president and general manager of HP's commercial PCs, said in a statement.

A recent 3M-sponsored study by the Ponemon Institute tipped a 90 percent visual hacking success rate—a frightening proposition for businesses whose employees take their work outside of the office.

HP Sure View is set for a September launch on the HP EliteBook 1040 Full HD touch and non-touch versions, as well as the HP EliteBook 840.

For more, check out PCMag's roundup of the Best Password Managers and How to Avoid Getting Hacked While Traveling.

Categories
GAMES
0 Comment

Leave a Reply

Captcha image


RELATED BY

  • 5300c769af79e

    Official: Get Ready to Hate Your Instagram Feed

    According to Instagram, users miss an average of 70% of their photo/video feeds.Sure, if you follow 1K+ people, that’s likely, but why are you following so many people in the first place?
  • 5300c769af79e

    Apple Quietly Boosts iPad Storage, Drops Prices

    As MacRumors points out, there are now new storage options for iPad Air 2 and iPad mini 4.9-inch iPad Pro also see price reductions, to $899 and $999, respectively.
  • 5300c769af79e

    Cloud Storage News, Analysis, & Advice

    Dawn KawamotoBy Freelance Writer and Editor, 4/14/2016ReadPost a Comment Amazon says that promoting Andy Jassy and Jeff Wilke to new CEO roles is not a reorganization.Here are the top 10 cloud positions in demand, some of which may surprise you.
  • 5300c769af79e

    In the Business of Exploitation

    Download Understanding the most commonly exploited software and the most frequently targeted vulnerabilities can aid in mitigating the threat posed by exploit kits.Assuming that exploit kits remain profitable for threat actors, it is likely that exploits for further vulnerabilities will be implemented in the future.