How criminals steal data over the air
Danger often comes from an unexpected direction. For example, while you are alert to pickpockets, criminals may be approaching invisibly, over Wi-Fi. Here’s a typical scenario: Let’s say you meet
467 articles
Danger often comes from an unexpected direction. For example, while you are alert to pickpockets, criminals may be approaching invisibly, over Wi-Fi. Here’s a typical scenario: Let’s say you meet
Yahoo is expected to announce a “massive” data breach ahead of its impending sale to Verizon. Although the news is not yet confirmed at the time of this posting (several
Today Google releases the Allo app — a new messaging app that was expected to provide a few cool features as well as privacy for its users. But the company
For centuries, advertising was fundamentally unidirectional. A company blasted out advertising and the public — actually, not a very predictable portion of the public — received it. That’s still the
Security experts and media pundits warn people to avoid posting pictures of their tickets online. Many people follow this rule, but not everyone. Time and time again and again, and
Just getting started with your new iOS device? That’s great, and we don’t want to be a buzzkill, but we strongly urge you do devote some time to adjusting the
In 2010 owners of the largest facial database in the world — Facebook — learned how to distinguish a portrait from a landscape: the social network searched for faces in
The surest way to prevent your webcam from transmitting images or video is to cover its lens. Lots of security-minded folks do just that, having read scary stories about malware
A recent story suggests Google is secretly recording your conversations and discussions. Although the story does have merit, it also has some problems. Google is recording voices; that’s entirely true.
The annual Google I/O conference traditionally gathers developers to give them the sense of direction for the upcoming year. This year was no exception: The audience got some insights on
I was blinded with a strong light and then was asked the life-and-death question: “What did you do on the 5th of the last month between 10 PM and 11:30
Social networks, online news outlets, media service providers, online shops — all of them offer high quality content, compared to the Internet of the past. To get to this quality,
Over the past few years drones have evolved from toys to powerful tools that can be used by pretty much everybody. Armies use them for scouting and aerial spotting, coast-guards
Saint Petersburg photographer Egor Tsvetkov recently published a photo project, created with the help of a service called FindFace. He turned the public’s attention to the website and accidentally awoke
Unless you are from Russia, you probably haven’t heard of a service, that analyzes an image of a person and finds their account in VK.com social network. It’s called FindFace.
Today information is currency. Data is bought and sold, stolen and changed, and of course, gathered. If you want to know something about somebody you can find a real bunch
In what will be our final chapter of our ‘Introduction to VPN’ course, I will tell you something beyond the usual tech jabber on VPN. I’ll cover some technical and
In the first months of 2016 a number of European countries have stated that Facebook is behaving irresponsible when it comes to users’ privacy. Facebook disagrees. In the beginning of
WhatsApp is one of the most popular instant messaging services in the world. The service has more than a billion users. Perhaps the biggest reason for the app’s popularity is
Unlike the majority of social media sites, LinkedIn is business oriented and focused on networking. This allows it to stand out and has contributed to its immense popularity. However, as
How long has it been since you were last alone? Probably never! Even within the walls of your skull you’re never really alone. For enemies are everywhere — since time