Security software talks back to thieves

Software designed to deter thieves will play a recorded message over the speakers once a laptop is marked as stolen.

A security software company has taken a new approach to stolen laptops by designing software that can blast a "this computer is stolen!" voice message at light-fingered thieves.

The program called Retriever, from Front Door Software Corporation, displays owner information as soon as a computer is booted, along with the login dialogue box. If the laptop is feared stolen, a message can be activated remotely over the internet.

The main concept behind the software is that simply by displaying owner information, with full details on how to contact them, most individuals will be honest and return a laptop if found. On its website the company claimed that this data will increase chances of recovery from three per cent to 97 per cent, though it provides no evidence for this.

Once a user finds that the laptop is stolen, the user logs into their online account and can then send a message to the computer, or even get it to play a message out loud repeatedly at intervals from either five minutes to every four hours. A lockdown code can be sent to prevent its use, and owners can even try and track the laptop using an IP location feature.

Advertisement - Article continues below
Advertisement - Article continues below

This software is one of many attempts from technology companies to protect laptops. At the end of last year, Lenovo revealed a system that would remotely deactivate laptops via an SMS message, while Intel announced that it was working with Ericsson on putting a kill switch inside' laptops.

In the second half of last year, thousands of mobile and laptops were left in the back of London taxis.

"I think software such as this has some place but what are you protecting," said Jay Heiser, research vice president at Gartner. "A used laptop is of minor importance, it's the data that's the important and if it's the only copy, then shame on you."

"Desktops [and laptops] are like dogs and pocket knives. You shouldn't expect to go round your entire career with the same one."

Featured Resources

What you need to know about migrating to SAP S/4HANA

Factors to assess how and when to begin migration

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

Testing for compliance just became easier

How you can use technology to ensure compliance in your organisation

Download now

Best practices for implementing security awareness training

How to develop a security awareness programme that will actually change behaviour

Download now


internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

data governance

Brexit security talks under threat after UK accused of illegally copying Schengen data

10 Jan 2020
cyber security

If not passwords then what?

8 Jan 2020
Policy & legislation

GDPR and Brexit: How will one affect the other?

9 Jan 2020
web browser

What is HTTP error 503 and how do you fix it?

7 Jan 2020