What is iPhone X Face ID and how secure is it?
How facial recognition works in the new Apple iPhone X — is it secure enough for you to trust?
460 articles
How facial recognition works in the new Apple iPhone X — is it secure enough for you to trust?
The essence of the HuMachine concept is a fusion of big data, machine learning, and our analysts’ expertise. But what is behind these words?
Can you be sure the encrypted USB drives you’re using won’t reveal your company’s secrets to hackers? Problem is, current certifications can’t guarantee it.
Modern cars are basically computers on wheels. The number of electronic components in vehicles has been increasing at a steady pace, and many models built in the past three to five years have a number of cameras, sensors, and radars on board, accompanied by hardware to process and analyze signals from all that equipment.
1. Make backups on a regular basis. 2. Make backups on a regular basis. 3. Make backups on a regular basis. 4. Make backups on a regular basis. 5. Make
And now, boys and girls, woo-hoo! Today is a day when woo-hoo’ing seems the most appropriate thing to do. Like this: WOO-HOO!!! Why, you say? We’ve officially launched our very
We keep talking (and talking, and talking) about passwords. Having strong passwords for all accounts is really a must: Our recent study shows that one in five users has experienced attempts to hack their accounts —
Before the advent of Internet dating, we used to head to various places to socialize and meet people — bars, pubs, clubs, parties, weddings, places of worship, and even the
How to choose an antivirus solution without falling for advertising tricks.
People truly enjoy the perks of the digital era and tend to shop and pay online or via mobile banking. Research commissioned by Kaspersky Lab confirmed that the majority of users (81%)
People post photos of their tickets online. Why shouldn’t they? Instagram alone contains thousands of images showing concert, airplane, and even lottery tickets. If everyone does it, why shouldn’t you?
Apple’s macOS is considered more secure than Windows, and with good reason: malware for macOS is far less frequently found in the wild. Unfortunately, that lets many users believe they
This post is intended for people who either never heard of ransomware or knew about it but didn’t really pay attention. We will explain in practical, down-to-earth language what ransomware
You’ve probably heard the word botnet more than once recently, and that’s hardly surprising. Any connected device can be zombified — turned into a part of a botnet. These include PCs, smartphones,
Setting up a home Wi-Fi router used to be a complicated task that was typically confusing and difficult for the average computer user. Responding to that issue, ISPs and router
So, you created a Facebook account, probably more than a few years ago. And maybe you even set it up well, checking through all of the available privacy and security
Perhaps the most striking point about last week’s huge DDoS attack, which took down more than 80 big websites and online services, is that the criminals behind the attack accomplished
It can be tempting to disregard software update notifications. Everything seems to be working fine. Sometimes programs behave oddly or crash after an update. And by the way, you have
In the beginning, the Internet was not terrifically user friendly — early users needed tech chops just to get online, and they had to do so over a wired, dial-up connection.
Do you like privacy? Well, let me introduce you to a new player in the encrypted messaging game: Secret Conversations. It comes from a messaging service many are already using, Facebook
Humanity is steadily getting older, which, in turn, increases the number of elderly people online. Today, almost almost 18% of Facebook users are 55 or older. We set out to learn what