Home smart home
Chances are your home already contains a few smart components. But can you make them even smarter so as to reap yet more benefits from them?
159 articles
Chances are your home already contains a few smart components. But can you make them even smarter so as to reap yet more benefits from them?
What web beacons and tracker pixels are, what’s so obnoxious about them, and how to disable them.
New iPhone 14 wows with Emergency SOS feature for emergency calls via satellite. How does it work, and is it available on any other smartphone?
In a new study, security experts explore eavesdropping on phone conversations through a bug inside almost every smartphone. How dangerous is it?
How authenticator apps work and what alternatives there are to Google Authenticator.
We look at how secure password managers are against hacks, and how to protect your passwords as much as possible.
A new generation of chatbots creates coherent, meaningful texts. This can help out both cybercriminals and cyberdefenders.
Everybody knows that we should prepare ourselves for a “quantum future”, but it was expected to come about in 10-20 years’ time. Is a breakthrough possible this year?
Avast solutions have a pretty good reputation, but a handful of incidents call their safety into question. Read on to learn whether Avast can be trusted.
In the final part of the series, we take a look at cryptocurrency politics, the future, and the metaverse.
In this second part of the series, we’re going to dive deep into Ethereum and its novelties: smart-contracts, DAOs and NFTs.
Everything you’ve always wanted to know about crypto on the whole, and NFTs in particular, and also why I’m not a fan of such tech, to say the least.
Apple’s new feature promises enhanced protection in the fight against targeted attacks.
We review a recent study on biometric authentication that uses breath analysis.
We explore the latest method for detecting hidden cameras and microphones described in one of the year’s best studies on personal security.
Can a device be hacked when switched off? Recent studies suggest so. Let’s see how this is even possible.
Most third-party apps for connected cars require access to your account with the manufacturer. But are they secure?
Let’s see how Google, Microsoft and Apple can work together to do away with passwords.
We explain what a smartphone’s ToF sensor is and how researchers from Singapore propose using it to find hidden cameras.
Some forged Green Pass certificates on sale on the Internet pass validation tests. However, it’s still not a good idea to buy them, and here’s why.
Apple plans to use its new CSAM Detection system to monitor users and identify those who store child pornography on their devices.