The convoluted art of making private and anonymous phone calls
A New York artist made an exhibition out of making a single private and anonymous cell phone call outside the scope of government spying. Here’s how he did it:
465 articles
A New York artist made an exhibition out of making a single private and anonymous cell phone call outside the scope of government spying. Here’s how he did it:
Fraudsters hacked Skype and tricked people from a contact list to send them about $5,000 over the course of a few days. Skype support, local banks and the police refused to do anything.
#BionicManDiary Entry 003 – The one where I bypassed the smartphone’s password protection whereas had intended to do a completely different thing
Kaspersky Lab created a mobile app to find a stolen or lost phone, remotely lock it, or delete sensitive data in case of device theft.
Let’s identify the main IT security and protection trends at MWC 2015.
During my first two weeks of the biochip experience I had time to mull over a lot of things. In this post I’m going to touch upon the subject of form factor.
Cyberbullying is one of the unpleasant effects of hyper-socialization that the Internet as a whole – and social networks in particular – bring us. Learn how to protect your children from it.
When it comes to Mobile OSes, every 3rd option conversation these days mentions the need for some “true openness”. But do we really need this kind of openness?
New allegations against the NSA claim the group hacked into the network of the world’s largest SIM card provider, stealing encryption keys to millions of devices.
The story of how a biochip was implanted into my hand and why I needed it.
It turned out that Lenovo’s laptops had been shipped with an adware called Superfish. It possibly allows eavesdropping on encrypted connections
There is a flood of appliances which could be connected – and some are connected – without a second thought as to whether or not it’s necessary or secure.
Let’s talk about the dangers of cross-border payments with plastic cards and security flaws in payment systems architecture.
Buried in Samsung’s terms of service is the admission that spoken words are picked up and passed along to third parties by voice recognition.
WhatsApp has finally released a Web version of its popular mobile messaging service. We take a look at it from the security perspective.
The Internet continues to find its way into the private lives of its users. Here, we brief you on the most common methods of online tracking.
The top privacy data leaks in 2014 include: data breaches at Target and Home Depot, hacks of JP Morgan and Barclays banks, and leaks at Orange and Dropbox.
“British Prime Minister David Cameron to Ban Encrypted Messengers” — Headlines like this are appearing here and there. But what happened exactly?
CES 2015 was a superb event in terms of the amount of new technology per square foot. But, from an information security standpoint, it did not appear all that positive.
On the one hand, drones are bound to violate privacy, whether on purpose or not. On the other, we’ve yet to discover and unleash their full potential.
We have constructed a list of promises that you should make to yourself this year to stay safe both online and offline.