Disclaimer: Hacking into someone's Tesla is not cool.A hacker from search engine company Qwant has revealed at least three ways a hacker can use to take control or access the workings of a Tesla Model X. The hacker, Gael Musquet,...
Everywhere you go online you leave bits of data. Hence, complete anonymity would mean staying off the web and technology altogether. Luckily, to be private and secure you don't have to start a new life in the woods.That’s why...
Just as you take steps to protect your identity in real life, you should also take measures to protect your identity online. This article and infographic will show you how to effectively stay anonymous on the Internet.Is it Possible...
Is your online password the name of your firstborn child? Or your favorite pet? Or perhaps your birth date? Maybe you used easy keyboard patterns like QWERTY and 123123. Or maybe your password is your childhood nickname. If it’s...
Digital privacy is paramount in a world where data is more valuable than gold. Everybody wants it: governments spy on their citizens, companies and advertisers track users online, even the Internet service providers (ISPs) in the US are allowed...
With the rise of cyber attacks all over the world, cyber security issues have become a top concern. It is more important than ever to begin thinking about how to protect not only your company's IT systems, but also...
When you have several accounts that are password-protected or you are the kind of person who can’t remember passwords, it is one of the most hellish things to keep track of your computer’s password. If you fail to do...
Some of you might remember "Crackas with Attitude", a hacking group consisting of Palestinian sympathizers responsible for what at the time were embarrassing hacks targeting CIA Director John Brennan, Secretary of Homeland Security Jen Johnson, Director of National Intelligence...
Google Project Zero researchers are constantly poking at operating systems and applications for zero day flaws that could leave them open to attack by hackers. This time, they found a weakness in Intel processors that potentially gives cyberattackers unauthorized...
What's It About? Facebook has launched a pilot test to combat "revenge porn" in Australia. The strategy entails uploading your nude photos or videos to Messenger in order to help Facebook tag it as non-consensual explicit media. Why it's Important A new...
A new Reuters report, corroborated separated by Apple, shows that the FBI could have lost valuable time by not requesting Apple to help unlock the Sutherland Springs mass shooter's iPhone after the incident.Critical information could have been retrieved about...
Renowned theoretical physicist, author and cosmologist Stephen William Hawking has once again warned the world about the future of artificial intelligence and the effects it could have on humanity as a whole. Talking to Wired magazine, Hawking said AI...
After mounting pressure from lawmakers as well as users to clean up its portal, social media giant Facebook has announced that over the next one year, it will double the current 10,000-strong workforce related to matters of content safety...
About a week ago, Bloomberg reported that Apple has been overcoming iPhone X production bottlenecks by quietly asking its suppliers to reduce face recognition accuracy on Face ID hardware. If that's true, which it might considering the leakiness of...
Amazon today launched new cloud-based hardware called the Amazon Cloud Cam. Essentially a security camera comparable to most similar products, the Cloud Cam has two distinct advantages: one, it is linked to the largest cloud infrastructure service in the...