Indra Group and Iran Railway Attacks May Be Related

Indra Group and Iran Railway Attacks May Be Related

CheckPoint security experts were able to identify the threat actors behind the latest Iranian cyberattacks

Facebook is Developing a Research Model to Combat Deepfakes

Facebook is Developing a Research Model to Combat Deepfakes

Deepfake software can be used maliciously by cybercriminals

Researchers Reveals Hacking Operations Targeting South Korea

Researchers Reveals Hacking Operations Targeting South Korea

North Korea engages in cyber espionage against South Korea

AI-Based Algorithm Developed by Researchers Could Make Text Captchas Obsolete

AI-Based Algorithm Developed by Researchers Could Make Text Captchas Obsolete

Artificial intelligence solves text captchas in 0.05 seconds

People Ignore Security Warnings Because They Come at Bad Times

People Ignore Security Warnings Because They Come at Bad Times

Research results will be integrated in Google Chrome

Compulsive Facebook Usage Linked to Acute Sleep Deprivation, Study Finds

Compulsive Facebook Usage Linked to Acute Sleep Deprivation, Study Finds

The less you sleep, the more time you spend on Facebook

  • Security
  • By Catalin Cimpanu
  • January 25th, 2016
Princeton University Experiment: IoT Devices Are Fundamentally Insecure

Princeton University Experiment: IoT Devices Are Fundamentally Insecure

Nothing new, move along! IoT still insecure!

Android Devs Pay Almost Double for Downloads Compared to iOS

Android Devs Pay Almost Double for Downloads Compared to iOS

It’s not easy being an Android developer today

Ad Blockers Caused Damages of $21.8B (€19.6B) in Ad Revenue

Ad Blockers Caused Damages of $21.8B (€19.6B) in Ad Revenue

Ad block usage grew 41% in the last 12 months

People Like to "Haha" on Facebook, Instead of LOLing

People Like to "Haha" on Facebook, Instead of LOLing

How do people express laughter on Facebook?

Tor Traffic Can Be Deanonymized, Researchers Claim

Tor Traffic Can Be Deanonymized, Researchers Claim

MIT & QCRI researches report an 88% accuracy at deanonymizing Tor traffic using malicious nodes added to the network

Researchers Develop HORNET, a Faster Tor Alternative

Researchers Develop HORNET, a Faster Tor Alternative

HORNET works like Tor, only at higher Internet speeds

Exposing Encrypted Communications to Law Enforcement Is a Double-Edged Sword

Exposing Encrypted Communications to Law Enforcement Is a Double-Edged Sword

Legal and technical problems would expose encrypted data to more than government agencies, even would-be attackers

Social Media Twice as Successful at Getting Youth to Quit Smoking Compared to Hotlines

Social Media Twice as Successful at Getting Youth to Quit Smoking Compared to Hotlines

Group engagement and a constant presence in your day-to-day life play a major role when it comes to giving up bad habits

This Website Allows Students to Grade Their Professors

This Website Allows Students to Grade Their Professors

Students have to take into account several criteria

Say Goodbye to Broken Screens, Your Future Phone Might Bundle Bulletproof Glass

Say Goodbye to Broken Screens, Your Future Phone Might Bundle Bulletproof Glass

Next-gen smartphones might get indestructible displays

Volcano Models Point Out Hazards Where Sensor Sweeps Can't

Volcano Models Point Out Hazards Where Sensor Sweeps Can't

Lava flows or not, those places can be nasty business

 
Want more? Browse: