Security

Google may add audio tool to two-step verification

Google has bought a company that specializes in using sound as a security authentication method. It could make two-step verification…

10 years ago
Honey Encryption Aims to Befuddle Crackers

Honey Encryption Aims to Befuddle Crackers

Determined hackers who fail to crack a password will simply try again until they succeed. But an ongoing security project…

10 years ago

Password no longer most popular password

The tech media is once again reporting on a list of the world's "worst" passwords. And once again, the list…

10 years ago

“Blackphone” Promises Total Security

The makers of a smartphone launching next month claim it offers complete security from snooping on all forms of communication.…

10 years ago

Most web traffic not human-driven

Nearly one in three visits to a website is from a computer up to no good according to a newly-published…

10 years ago

LG Smart TV Phones Home

The owner of an LG Smart TV says he's got evidence that the TV is sending details about his viewing…

10 years ago

Rounding error robot no multi-million dollar operation

A Romanian security researcher has created a machine that can take advantage of rounding errors to make money at the…

10 years ago

Google to Share DDoS Defenses

Google has unveiled three tools expressly designed to aid people whose internet communication is threatened by oppressive regimes. It could…

11 years ago

Opinions on Internet Privacy [Comic]

I'm the philosopher until someone hands me a burrito. So geeks, which train of thought do You follow? Let us…

11 years ago

Rogue iOS App Makes Evil Transformation

Researchers at Georgia Tech say they've found a creative way to bypass the iTunes store security reviews: by having an…

11 years ago