Samsung Smart TV Listens While You Watch. Get Used to It.
A couple of weeks ago someone posted the following quote from Samsung’s Smart TV terms of service on Reddit: “Please be aware that if your spoken words include personal or
3067 articles
A couple of weeks ago someone posted the following quote from Samsung’s Smart TV terms of service on Reddit: “Please be aware that if your spoken words include personal or
It’s the beginning of February and we’ve already seen three Adobe Flash zero days, an Internet wide-vulnerability in Linux and our first massive data breach of Anthem Inc., an enormous
The popular mobile messaging service WhatsApp released WhatsApp Web late last month. The service will allow users to run WhatsApp on their favorite Web browser — so long as their
Once a user looks up a laptop or a slow cooker online, advertisements from online stores will begin to appear as if from the horn of abundance. This is exactly
In our recent blog post, “Jiggling with cards: doing criminal business on ATMs“, we told you how easily you could lose your money because of the tricks carders play on
As more and more people upgrade to the latest iPhone, there’s an increasing demand for second-hand devices. This, naturally, has led to fraudsters moving into the market as well. Thousands
“In God we trust, the rest we check” — A wise principle when discussing computer security, especially when using QR codes. The QR code has gained popularity in recent years
Have you ever wondered how a typical office would look like in a decade or so? The first things to come to your mind is likely to be some pseudo
In part one of our article, we discussed technology used by bank card ‘seekers’. Today we’ll relate another part of the story, covering how criminals carry out the most dangerous skimming
A new variant of the Onion ransomware has emerged, though you might see it referred to as CTB-locker or Citroni. Whatever you decide to call it, CTB-Locker is a Cryptolocker-like
Every year millions of people become victims of a data breach. For the majority, the results are the same: hackers sell users’ data on underground websites and companies have to rush
Not surprisingly, one researcher realized last week that he could exploit Progressive’s Snapshot driver tracking tool in order to hack into the on-board networks of certain auto-mobiles. Snapshot is a
As a student, I had a little part time job of servicing and administrating computers for small businesses. Years have passed, but there are occasions when I have to remember
The new product of ours, Kaspersky Total Security, has just hit the shelves, and our customers have been bombarding us with questions ever since: “What are the key differences between
Gizmodo recently published a list of the most popular passwords of 2014, smugly deriding those morons who deploy poorly conceived credentials. Ironically, it may bear reminding that Gizmodo is owned
We all know to be aware of pickpockets. Even if it did not include tips on watching your pockets when outdoors, life itself provides opportunities to learn the simple rules.
Do you get enough sleep at night? Honestly, I don’t and neither do a lot of my friends. Whether it’s down to today’s hectic lifestyle or something more serious such
Blackhat, directed by Michael Mann (Heat, The Last of the Mohicans) is a digital whodunit about a pair of cyberattacks and the duo of unlikely bedfellows — a colonel on
“British Prime Minister David Cameron to ban encrypted messengers” — headlines like this one are all over the news at the moment, and with good reason. Opinions vary from “Let’s protect
The first ever publicly known Mac OS X firmware bootkit emerged out of the 31st Chaos Computer Club conference in Hamburg, Germany last month. Security researcher Trammel Hudson developed the
CES 2015 was a superb event in terms of new stuff per square foot, which has been referred to numerous times by tech website reporters. As for me, a person