Here’s how we should approach artificial intelligence
It’s obvious already that AI needs regulating, but how? Here’s Eugene Kaspersky telling us how he sees it.
154 articles
It’s obvious already that AI needs regulating, but how? Here’s Eugene Kaspersky telling us how he sees it.
Learn how geolocation services work, and who learns of your location when your smartphone pins it down.
Image-generating neural networks are already everywhere. What privacy risks do they pose?
Better put them on something not very valuable or necessary. Here we explain why.
If you want your smart home to do more good than harm, you should configure it correctly and secure it adequately. We review smart-home security in detail.
We explain how two-factor authentication with one-time codes works, what the benefits and risks are, and what else you can do to better protect your accounts.
AI is going to have a tremendous impact on our lives. How can we get ready for it?
Chances are your home already contains a few smart components. But can you make them even smarter so as to reap yet more benefits from them?
What web beacons and tracker pixels are, what’s so obnoxious about them, and how to disable them.
New iPhone 14 wows with Emergency SOS feature for emergency calls via satellite. How does it work, and is it available on any other smartphone?
In a new study, security experts explore eavesdropping on phone conversations through a bug inside almost every smartphone. How dangerous is it?
How authenticator apps work and what alternatives there are to Google Authenticator.
We look at how secure password managers are against hacks, and how to protect your passwords as much as possible.
A new generation of chatbots creates coherent, meaningful texts. This can help out both cybercriminals and cyberdefenders.
Everybody knows that we should prepare ourselves for a “quantum future”, but it was expected to come about in 10-20 years’ time. Is a breakthrough possible this year?
Avast solutions have a pretty good reputation, but a handful of incidents call their safety into question. Read on to learn whether Avast can be trusted.
In the final part of the series, we take a look at cryptocurrency politics, the future, and the metaverse.
In this second part of the series, we’re going to dive deep into Ethereum and its novelties: smart-contracts, DAOs and NFTs.
Everything you’ve always wanted to know about crypto on the whole, and NFTs in particular, and also why I’m not a fan of such tech, to say the least.
Apple’s new feature promises enhanced protection in the fight against targeted attacks.
We review a recent study on biometric authentication that uses breath analysis.