Crypto, really. Part III: cryptocurrency politics, and the future
In the final part of the series, we take a look at cryptocurrency politics, the future, and the metaverse.
141 articles
In the final part of the series, we take a look at cryptocurrency politics, the future, and the metaverse.
In this second part of the series, we’re going to dive deep into Ethereum and its novelties: smart-contracts, DAOs and NFTs.
Everything you’ve always wanted to know about crypto on the whole, and NFTs in particular, and also why I’m not a fan of such tech, to say the least.
Apple’s new feature promises enhanced protection in the fight against targeted attacks.
We review a recent study on biometric authentication that uses breath analysis.
We explore the latest method for detecting hidden cameras and microphones described in one of the year’s best studies on personal security.
Can a device be hacked when switched off? Recent studies suggest so. Let’s see how this is even possible.
Most third-party apps for connected cars require access to your account with the manufacturer. But are they secure?
Let’s see how Google, Microsoft and Apple can work together to do away with passwords.
We explain what a smartphone’s ToF sensor is and how researchers from Singapore propose using it to find hidden cameras.
Some forged Green Pass certificates on sale on the Internet pass validation tests. However, it’s still not a good idea to buy them, and here’s why.
Apple plans to use its new CSAM Detection system to monitor users and identify those who store child pornography on their devices.
How Zoom security is evolving, what threats are still current, and how developers plan to eliminate them.
We’ve been using machine learning in Kaspersky Internet Security for Android for years now. Here’s why — and what we’ve achieved.
Researchers at RSA Conference 2021 demonstrated how Tesla and Mobileye autopilots can be tricked by “phantom” images.
We reviewed some dedicated noise reduction apps and selected the most useful solutions for PCs and mobile devices.
At home, whether you’re trying to work or to rest, noisy neighbors can be a real nuisance. Modern technologies can help.
We examine the tale of Cinderella, one of the earliest stories that attempts to teach children basic cybersecurity principles.
If we are to believe the science-fiction of the last century, the hackers of 2020 should have access to a rather curious toolkit.