
Voice assistants hear things we don’t
We explain how ultrasound and audio recordings hidden in background noise can be used to control voice assistants.
167 articles
We explain how ultrasound and audio recordings hidden in background noise can be used to control voice assistants.
Analysis of a German sex toy reveals all sorts of vulnerabilities.
New iPhones support eSIM technology. We explain what it is and who will soon be using it.
Security researchers found several ways to compromise hardware cryptocurrency wallets made by Ledger and Trezor.
Experts discovered lots of interesting things in the code of North Korean antivirus SiliVaccine.
Meet Lenny, the voice chatbot that can be used against telemarketers and phone scammers.
The year 2018 passed under the sign of Spectre and Meltdown hardware vulnerabilities. What does 2019 have in store in this regard?
Smart home appliances are dependent on remote servers, apps, and other things, which can cause all kinds of trouble.
Blockchain was designed to reliably store data forever. Unfortunately, such design conflicts with modern privacy legislation trends.
The story of patent US5490216, which struck terror in the hearts of IT professionals and cost a whole lot of tech companies hundreds of millions of dollars.
It’s not Malevich’s Black Square. This is what a screenshot taken by a suspicious application on a computer protected by Kaspersky Lab products looks like.
How tools designed to study and protect rare species can turn from gamekeeper to poacher.
Advertising in voice assistants is coming soon. We examine how it will use personal data and what you can do about it.
A look at how payment information is protected on smartphones that support contactless payments.
We explain what digital certificates are, what types exist, and what problems are associated with them.
Rumor has it that typing “BFF” as a Facebook comment checks your profile security. We investigate the claim.
Researchers investigate how vulnerabilities in robots can be exploited to take control of them.
Almost every new smartphone now lets you unlock it with your face — and that’s really bad for security.
Solar power and wind energy could one day replace oil and gas.
Two new fingerprint-scanning technologies revealed at Mobile World Congress 2018 use different approaches.