Voice assistants hear things we don’t
Our interaction with technology could soon be predominantly voice-based. To ask for something out loud and hear the answer is literally child’s play: Just take a look at how effortlessly kids use voice...
View ArticleWhen Artificial Intelligence affects lives
Despite our previous coverage of some major issues with AI in its current form, people still entrust very important matters to robot assistants. Self-learning systems are already helping judges and...
View ArticleIs it possible to guard against GPS attacks?
Driving downtown, you glance at your navigation app and see that it thinks that you are at the airport. A bit unsettling, no doubt. This is not a made-up situation; it’s a real example of GPS spoofing...
View ArticleOur new emulator technology: real crafty malware’s worst nightmare.
Have you ever wondered why computer viruses are called just that – ‘viruses’? Well, actually, today the word viruses is used somewhat misleadingly to refer to most ‘any type of malicious program, or is...
View ArticleEarth 2050: Visions of the future, today
Originally published in Eugene Kaspersky’s blog You may have already heard about the big change at our company last week. However, big changes are nothing new to us! Ever since we began 22 years ago,...
View ArticleSign In with Apple — quick login for privacy geeks
At its Worldwide Developer Conference earlier this June, Apple presented its new authentication system, Sign In with Apple, which lets users create new website and app accounts using their Apple ID....
View ArticleWhat is digital steganography?
We all know what it means to “read between the lines” in a figurative sense, but before we used modern technology to communicate with one another, people sometimes took it literally, such as by writing...
View ArticleSmart home hacks
Smart home technologies are designed to make life easier and more convenient. However, new conveniences also mean new problems. The dangers of automating anything and everything are a frequent topic of...
View ArticleMy home is my castle: Security technologies for the house
Your home is your own private island of tranquility where you can rest easy — if it’s secure, that is. If not, then one not-so-fine day it could turn into a public place. With that in mind, we compiled...
View ArticleInternet in space: Is there Net on Mars?
By now, the Internet has reached basically all corners of the Earth — and not just its surface. Being online onboard an airplane is already old hat, and even the International Space Station has a...
View ArticleSense and sensibility: Do we want AI to master emotions?
Imagine you come home one day in a bad mood, shout at the door for not opening fast enough and at the light bulb because it burned out — and the smart speaker immediately starts playing chill music,...
View ArticleThe curious vulnerabilities of ordinary MEMS
Digital devices now have “sense organs” to help them interact with the physical world. On the one hand, that’s awfully convenient for users. But on the other hand, it creates new threats, and they’re...
View ArticleFaking fingerprints — doable, but hard
For years, the security of fingerprint-based authorization has been a topic of fierce debate. Back in 2013, shortly after the release of the iPhone 5S with TouchID, researchers showed the technology...
View ArticleQuantum computers 101
Last fall, Google announced that it had achieved quantum supremacy. If that sounds a bit abstract and not relevant to the average user, think again. What the Google team did, essentially, was use a...
View ArticleHow to keep track of little ones on the loose
With some kids, it takes just a few seconds of distraction while the whole family is at the mall. If your child pops out of view, they’ll usually be right back in just as few blinks of the eye. You...
View ArticleZoom 5 moves toward security
Not so long ago, we explained how to configure Zoom to make it safer to use. However, technologies can develop very rapidly, especially those in the spotlight. One such case is Zoom, whose developers...
View ArticleWhat are App Clips and Instant Apps?
A few days ago, at its worldwide developer conference (WWDC 2020, held in full virtual mode because of the coronavirus outbreak), Apple unveiled the next version of iOS. One of its innovations is App...
View ArticleQuantum computers and cryptography for dummies
Quantum computers are capable of very quickly solving very complex problems, such that even a supercomputer would be stumped for a long time. True, most of these problems are currently somewhat removed...
View ArticleLamphone: A new kind of “visual eavesdropping”
Not so long ago, we wrote about methods that Mordechai Guri and his colleagues at Ben-Gurion University devised to extract information from a device that is not only not connected to the Internet, but...
View ArticleSpiKey: Eavesdropping on keys
A lock is reliable only insofar as it cannot be defeated by an intruder. Computer technology makes things easier, alas, including for those who hate doors they cannot open (and no, we are not talking...
View Article
More Pages to Explore .....