Mobile fingerprint sensors: more or less secure?
Vendors claim, that a fingerprint sensor in your smartphone is user-friendly and really secure. But it’s not true.
628 articles
Vendors claim, that a fingerprint sensor in your smartphone is user-friendly and really secure. But it’s not true.
The IoT is inherently lacking in security. Make sure a hacker can’t talk to your kids via baby monitor.
Our bionic man Evgeny Chereshnev shares his thoughts on CES 2016, talks security issues in the not-so-groundbreaking tech products introduced at the show.
Fix your cybersecurity problems with this 12-month resolution.
Facebook will now let Google index the mobile app from the search engine.
Popular online messengers cannot be considered secure enough, yet people continue to use them to exchange private and critical information.
What does Google know about you and me? Let’s check it with the new “About me” tool.
Criminals can use VoLTE to cause connection failure, subdue voice calls, or strip the victim’s mobile account of money.
The world is a reality TV show and sometimes we cannot resist the opportunity to snap up our piece of fame. But let’s not make the kids a part of our life-long promo.
In this edition of Security Week infosec digest we’ll cover threecases of companies being hacked and data being leaked and companies reacting on the incidents.
Tips and methods of hacking global surveillance: makeup, special clothes, eyeglasses and more.
Yesterday The European Court of Justice ruled that the Safe Harbor agreement is invalid: what does this decision mean for your personal data?
Are you committing these six online parenting sins? If so, please stop.
Cyber-literate users possesses a variety of good habits, which protect them online and offline. What are these traits?
Facial recognition algorithms can track your movements with amazing accuracy. But if you know how they work you can trick them.
They teach a lot of things in schools, but they never tell you how to be safe in Internet. We have several simple advices on cybersecurity for you, that will help you stay away from trouble.
Infosec digest: exploit kit Neutrino in Wordpress, yet another GitHub DDoS, Wyndham responsible for breach, while Target is not
A year ago, an infamous leak which exposed some celebrities’ nude photos sparked the discussion around password safety. What can you do protect your accounts?
Just think of the sticky fingers of banks, marketers and insurers that hunt for your personal data with revolting impudence and store them unsecured. So, what’s the fuss about?
Once more into a breach: 9.7 gigabytes of stolen data with users’ emails, credit card transactions and profiles leaked into the darknet.
Merely 23 years ago Microsoft released Windows 3.1 operating system, Apple showed its first iPhone PDA, and Linus Torvalds released Linux under GNU license. Eugene Kaspersky published the book with