Tell me who you are and I will tell you your lock screen pattern
Predictability of human beings can barely be overestimated when it comes to passwords. But what about lock screen patterns, are we predictable as well when we’re creating them?
77 articles
Predictability of human beings can barely be overestimated when it comes to passwords. But what about lock screen patterns, are we predictable as well when we’re creating them?
Researchers compete at finding security holes in infotainment systems of connected cars and breaking in. The new case proves that Tesla does care a lot about security at wheel.
Speaking about legal side of the question, it’s very easy to kill a human: all you need is common sense and a computer with Internet access
Taking over a Jeep Cherokee driving at speed 70 mph at a remote highway is quite real.
Kaspersky Lab researchers examined one city’s network of surveillance cameras and determined that the systems were not very secure.
Scientifically proven: video games may really boost your intellectual abilities.
“All the things I really like to do are either immoral, illegal, or fattening.” As always, there are exceptions.
Researcher discovers that Progressive Snapshot tools lack any real security controls and could be exploited by attackers to hack cars.
Are you getting enough sleep at night? If not, it might be because your sleep pattern is disrupted due to the display on your PC, TV, tablet, and smartphone.
A researcher has developed a nasty boot kit capable of taking complete control of Mac OS X devices. Here is what you need to know.
A new variant of the Zeus banking trojan has emerged, targeting consumer accounts at 150 banks in 15 countries.
A new APT campaign called Regin targets the usual victims plus a prestigious cryptographer and the GSM standard on which most cellular communications occur.
New research shows that studying and mnemonic devices could help us to better remember our passwords.
New analysis pinpoints some weaknesses in a new generation of cars with online capabilities. If exploited, this may result in car theft and other problems.