Just breathe! Unusual biometrics based on odor
We review a recent study on biometric authentication that uses breath analysis.
128 articles
We review a recent study on biometric authentication that uses breath analysis.
We explore the latest method for detecting hidden cameras and microphones described in one of the year’s best studies on personal security.
Can a device be hacked when switched off? Recent studies suggest so. Let’s see how this is even possible.
Most third-party apps for connected cars require access to your account with the manufacturer. But are they secure?
Let’s see how Google, Microsoft and Apple can work together to do away with passwords.
We explain what a smartphone’s ToF sensor is and how researchers from Singapore propose using it to find hidden cameras.
Some forged Green Pass certificates on sale on the Internet pass validation tests. However, it’s still not a good idea to buy them, and here’s why.
Apple plans to use its new CSAM Detection system to monitor users and identify those who store child pornography on their devices.
How Zoom security is evolving, what threats are still current, and how developers plan to eliminate them.
We’ve been using machine learning in Kaspersky Internet Security for Android for years now. Here’s why — and what we’ve achieved.
Researchers at RSA Conference 2021 demonstrated how Tesla and Mobileye autopilots can be tricked by “phantom” images.
We reviewed some dedicated noise reduction apps and selected the most useful solutions for PCs and mobile devices.
At home, whether you’re trying to work or to rest, noisy neighbors can be a real nuisance. Modern technologies can help.
We examine the tale of Cinderella, one of the earliest stories that attempts to teach children basic cybersecurity principles.
If we are to believe the science-fiction of the last century, the hackers of 2020 should have access to a rather curious toolkit.
These handy tools make watching shows on Netflix even easier and safer.
Keys make a clicking sound when inserted in door locks. Scientists have found a way to duplicate a key using a recording of the sound.
A lightbulb is all the specialist equipment Lamphone needed to eavesdrop on a conversation in a soundproofed room.
We explore how encryption protects your data and why quantum computers might shake things up.