#BionicManDiary, entry 001: the story of how a chip was implanted into my body
I woke up to find a Band-Aid on my hand. It was covering a small wound between the thumb and the index finger. That was when I had a WTF moment.
660 articles
I woke up to find a Band-Aid on my hand. It was covering a small wound between the thumb and the index finger. That was when I had a WTF moment.
It turned out that Lenovo’s laptops had been shipped with an adware called Superfish. It possibly allows eavesdropping on encrypted connections.
Buried in Samsung’s terms of service is the admission that spoken words are picked up and passed along to third parties by voice recognition.
WhatsApp has finally released a Web version of its popular mobile messaging service. We take a look at it from the security perspective.
Security reporters Brian Donohue and Chris Brook discuss security and privacy headlines from the first few weeks of the new year.
CES 2015 was a superb event in terms of the amount of new technology per square foot. But, from an information security standpoint, it did not appear all that positive.
On the one hand, drones are bound to violate privacy, whether on purpose or not. On the other, we’ve yet to discover and unleash their full potential.
Kaspersky Lab experts analyze the security and privacy trends that emerged in 2014, including anonymous Tor browsing, ransomware, APT attacks and more.
In this Talk Security podcast, Threatpost’s Chris Brook and Brian Donohue discuss the move to encrypt the Web, the Regin APT campaign and more.
Let’s take a moment to discuss the numerous troubles that our bright, technology-packed future could bring about.
The Electronic Frontier Foundation recently graded a slew of mobile and Internet messaging services based on security and privacy. Here we list the low scorers.
By default, your iPhone’s OS is set to give you the best performance instead of the best battery life. But you can change that!
The Electronic Frontier Foundation recently graded a slew of mobile and Internet messaging services based on security and privacy. Here we detail the top scorers.
Let’s take a look at the security features in the new version of Mac OS X – Yosemite. Apple certainly makes a decent effort.
Apple malware targets iOS by infecting OS X machines and then swapping legitimate apps for malicious ones as soon as an iOS device connects via USB.
Drupal warns customers that they should assume their sites are compromised unless they installed an update from mid-October within hours of the release.
Today, users are readily spending their money on house arrest-style services similar to those used for tracking criminals. They call them fitness trackers.
Google’s mobile operating system joins Apple’s iOS in offering full disk encryption by default to all users in its newest version — Android 5.0 aka Lollipop.
New research shows that studying and mnemonic devices could help us to better remember our passwords.