Have you ever lost an expensive phone?

iPhone Tracking Service Provider TekTrak Locates Seed Funding

Have you ever lost an expensive phone? Hurts, doesn’t it?

I’ve experienced it, and it’s only when it happens when you realize you’ve not only lost a costly device that you’ll need to replace with another one soon, but that losing it also means someone might stand to gain access to your photos, emails, bank accounts and so forth.

Mobile security software maker TekTrak thinks it has a solid solution for that problem, and the startup has just raised a seed funding round from some notable angels to prove it can turn it into a profitable business, too.

Tektrak has developed an iPhone app dubbed TekTrak Pro ($2.99) that allows users to monitor the precise location of their device at all times and secure sensitive or private information stored on the phone. The TekTrak application uses 3 hardware components already built into most smartphones (cellular, GPS, and WiFi) to pinpoint the location of the phone, in the background of iOS.

Obviously, this only works when the phone is turned on, but users can always see where the phone was last located (which might help them retrieve it on the spot).

Location tracking and history aside, the TekTrak app also comes with a remote ringer feature that gives users the ability to locate their device once they’ve narrowed down its whereabouts and are located in close proximity of the phone. Evidently, this is only useful when sound is turned on.

Internet Explorer — in danger!

Microsoft has found out vulnerability in Internet Explorer, allowing hackers to get remote access to the computer of a victim. On it it is informed on a company site. It have appeared vulnerability all existing versions of a browser, except IE 5.01 c Service Pack 4, installed on Windows 2000 Service Pack 4 are subject almost.

 

Internet Explorer 6 — in danger!

While, according to site Microsoft, dangers are subject to version IE 6 Service Pack 1 under Windows 2000 Service Pack 4, IE 6, IE 7 and IE 8, working on Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7 and Windows Server 2008 R2.

Investigation has shown, that for today the limited number of attempts of use of the found out vulnerability is registered. In most cases users Internet Explorer 6 were exposed to attack. Engineers Microsoft work over elimination of vulnerability and promise to correct defect in the near future.