Security Week 34: One cannot simply patch…
One can find a number of reasons why this very bug cannot be patched right now, or this quarter, or, like, ever. Yet, the problem has to be solved.
117 articles
One can find a number of reasons why this very bug cannot be patched right now, or this quarter, or, like, ever. Yet, the problem has to be solved.
The number of vulnerable Google devices reached an all-time high since worst Android flaws ever are uncovered. There are already patches available but they may never reach end users.
At the recent Google I/O conference, the ‘corporation of good’ announced four projects: Soli, Jacquard, Vault, and Abacus. Let’s see what these curious techs are about.
What do a billionaire inventor Elon Musk, the Google Now on Tap service, and the recent “Ex Machina” movie have in common? They all are about artificial intelligence.
Tech journalists Chris Brook and Brian Donohue discuss Google I/O, the IRS and Carefirst BlueCross BlueShield Data Breach in this Talk Security podcast.
At Google I/O 2015, the software giant presented a slew of new features and services. We take a first look at customizable app permissions, Android Pay, Now on Tap, and others.
There are many cool and funny projects in the world that deal with big data and we’ve gathered the Top 10 list of the most interesting ones. See for yourself!
The design of the current smartwatches is defined by being aimed at geeks. It looks like it will again take Apple to perform its duties carefully iSplaining wearables to ordinary people.
When it comes to Mobile OSes, every 3rd option conversation these days mentions the need for some “true openness”. But do we really need this kind of openness?
As is, a QR code can quickly take you to a site or another resource but not necessarily to the one you really want to visit. Thus Kaspersky Lab offers a free and safe QR scanner!
As part of its Project Zero security initiative, Google disclosed a few vulnerabilities in Windows, some ahead of a planned patch. Google simply adhered to its “publicize in 90 days after private vendor disclosure” policy, but where are end users’ interest in this “game of flaws”?
Security reporters Brian Donohue and Chris Brook discuss security and privacy headlines from the first few weeks of the new year.
One of the most highly anticipated prospects of the 21st century has been the possibility of enabling robots to drive cars. But how soon could this be possible?
It’s not always easy to give general advice to Android users because the OS is so very diverse. But we have ten security tips that are relevant for almost any Android version.
Google’s mobile operating system joins Apple’s iOS in offering full disk encryption by default to all users in its newest version — Android 5.0 aka Lollipop.
Data breaches have become a routine. It can happen to any site, any day. You can’t prevent it, but there is a way to minimize the damage.
Making a case for password reuse, Google hiring hackers to fix the Internet, Apple bolsters security across its services with strong Crypto, plus various fixes and more.
Google is releasing a tool that ensures all data passing out of its Chrome browser is encrypted in transit, resolving the problem of relying on others’ crypto.
Adults can choose to face the financial consequences of their own actions, but they may want to know how to prevent their kids from running up exorbitant credit card bills tied to the parents’ iTunes or Google Play accounts.
OpenID and OAuth are protocols responsible for those “Login with Facebook” and “Authorize with Google” buttons you see on almost every site nowadays. Of course, there is a hack for that™, but you don’t need neither panic nor change your password. Read on for our simple action plan.
It appears that PCs are not only able to spy on you via cameras, but they’re also able to listen in on you on as well, and in a discreet