- Security
- By George Dascalu
- August 23rd, 2021
Indra Group and Iran Railway Attacks May Be Related
CheckPoint security experts were able to identify the threat actors behind the latest Iranian cyberattacks
- Security
- By George Dascalu
- June 17th, 2021
Facebook is Developing a Research Model to Combat Deepfakes
Deepfake software can be used maliciously by cybercriminals
- Security
- By George Dascalu
- June 2nd, 2021
Researchers Reveals Hacking Operations Targeting South Korea
North Korea engages in cyber espionage against South Korea
- Security
- By Sergiu Gatlan
- December 5th, 2018
AI-Based Algorithm Developed by Researchers Could Make Text Captchas Obsolete
Artificial intelligence solves text captchas in 0.05 seconds
- Security
- By Catalin Cimpanu
- August 22nd, 2016
People Ignore Security Warnings Because They Come at Bad Times
Research results will be integrated in Google Chrome
- Social Networking Related
- By Catalin Cimpanu
- February 26th, 2016
Compulsive Facebook Usage Linked to Acute Sleep Deprivation, Study Finds
The less you sleep, the more time you spend on Facebook
- Security
- By Catalin Cimpanu
- January 25th, 2016
Princeton University Experiment: IoT Devices Are Fundamentally Insecure
Nothing new, move along! IoT still insecure!
- Mobile World
- By Alexandra Arici
- August 31st, 2015
Android Devs Pay Almost Double for Downloads Compared to iOS
It’s not easy being an Android developer today
- Internet Life
- By Catalin Cimpanu
- August 13th, 2015
Ad Blockers Caused Damages of $21.8B (€19.6B) in Ad Revenue
Ad block usage grew 41% in the last 12 months
- Social Networking Related
- By Catalin Cimpanu
- August 10th, 2015
People Like to "Haha" on Facebook, Instead of LOLing
How do people express laughter on Facebook?
- Security
- By Catalin Cimpanu
- August 3rd, 2015
Tor Traffic Can Be Deanonymized, Researchers Claim
MIT & QCRI researches report an 88% accuracy at deanonymizing Tor traffic using malicious nodes added to the network
- Security
- By Catalin Cimpanu
- July 27th, 2015
Researchers Develop HORNET, a Faster Tor Alternative
HORNET works like Tor, only at higher Internet speeds
- Online Surveillance
- By Catalin Cimpanu
- July 8th, 2015
Exposing Encrypted Communications to Law Enforcement Is a Double-Edged Sword
Legal and technical problems would expose encrypted data to more than government agencies, even would-be attackers
- Web Blog
- By Catalin Cimpanu
- June 10th, 2015
Social Media Twice as Successful at Getting Youth to Quit Smoking Compared to Hotlines
Group engagement and a constant presence in your day-to-day life play a major role when it comes to giving up bad habits
- Internet Life
- By Andreea Murgu
- May 18th, 2015
This Website Allows Students to Grade Their Professors
Students have to take into account several criteria
- Mobile World
- By Alexandra Arici
- April 29th, 2015
Say Goodbye to Broken Screens, Your Future Phone Might Bundle Bulletproof Glass
Next-gen smartphones might get indestructible displays
- 3D Printing Blog
- By Sebastian Pop
- February 25th, 2015
Volcano Models Point Out Hazards Where Sensor Sweeps Can't
Lava flows or not, those places can be nasty business