Facial recognition gets interesting — and useful
Facial recognition technology is a powerful tool that can be used for good or evil. In this post, we present 10 positive aims fulfilled with the help of this technology.
2892 articles
Facial recognition technology is a powerful tool that can be used for good or evil. In this post, we present 10 positive aims fulfilled with the help of this technology.
Last week Facebook posted a video of its solar-powered Aquila drone’s inaugural flight. The aircraft’s design is of flying wing type, with a wingspan close to that of Boeing 737, covered with solar panels.
You scroll through profiles on a dating site and you see a nice girl who you might like to date. You can send her a message — and she’ll answer
Airports offer a lot of time for reflection. When you travel for business, you are often alone, so you have lots of time to sit and reflect on the meetings
The surest way to prevent your webcam from transmitting images or video is to cover its lens. Lots of security-minded folks do just that, having read scary stories about malware
Ransomware has hit the news in a big way lately. Is this malware just another hot-button topic that everybody will forget about as soon as a new big threat emerges?
Almost every cyberattack has the same goal — stealing someone’s money. However, as a vast variety of equipment is getting connected, a buggy device can lead to more serious consequences than
We truly hope that you keep in mind the risks of public charging spots. But what about users who are always on the road or spend a lot of time away from
Picture this irritating scenario: You are installing an update for Notepad++, Yahoo Messenger, or WinRAR and your antivirus pipes up to warn you the software is malware. You know that
Everyone likes Twitter. Well, okay, maybe not everyone, but at least 310 million users visit the microblogging platform monthly. And now these 310 million have to consider changing their Twitter password. This
Starting on June 10, many people will be tuning into Euro 2016 football championship and trying to consume as much info as they can. Much like many other large sporting
Update: The product described in this post is discontinued. To protect your desktop or laptop use . Someone may call it paranoia; some think it’s just common sense: At Kaspersky
A recent story suggests Google is secretly recording your conversations and discussions. Although the story does have merit, it also has some problems. Google is recording voices; that’s entirely true. However, it
Like the invention of the fire pit, the history of the first password is lost to the depths of time. We know that Romans used them. Shakespeare mentioned passwords in The Tragedy
Chances are that if you used Myspace or Tumblr, you may be in for something of a headache. You see, it’s been reported that both social networks have had troves
Chances are that each of us has found ourselves in a situation where our phone is dying and we have no charger on hand, but at the same time we
Unlike previous malware trends that have varying purposes, ransomware’s is quite simple: Get Money. With a goal like that spurring on malicious developers, it’s no wonder ransomware’s star is on
The annual Google I/O conference traditionally gathers developers to give them the sense of direction for the upcoming year. This year was no exception: The audience got some insights on
Social networks, online news outlets, media service providers, online shops — all of them offer high quality content, compared to the Internet of the past. To get to this quality,
The biggest data breach in history happened when Mossack Fonseca papers fell into the hands of German journalists. The leaked a 2.6 terabyte archive that included 11.5 million documents — it’s three times
In the first months of 2016 a number of European countries have stated that Facebook is behaving irresponsible when it comes to users’ privacy. Facebook disagrees. In the beginning of