Tag Security - results: 69

How will

How will "special security blanket" from Volvo

recently, Volvo introduced an Autonomous electric concept car called the 360c, which included "a special security blanket" (similar to seat belts and airbags) for when you will sleep in a horizontal position in the car. This blan...

28

1 0

2018-09-08

Comments:
0
Google wants to

Google wants to "kill" the URL in the name of security users

Google Engineers are going to arrange another reform on the Internet. The Google Chrome browser already eradicates the HTTP Protocol, marking using his sites as unsafe and forcing administrators to move to HTTPS encryption. Accord...

29

1 0

2018-09-06

Comments:
0
The Intel found 3 vulnerabilities. They allow you to steal

The Intel found 3 vulnerabilities. They allow you to steal

Today Intel announced three new vulnerabilities of their processors. According to the American company, these vulnerabilities can be exploited to gain access to some data stored in the computer memory. Under the threat of a proces...

79

1 0

2018-08-15

Comments:
0
Body camera police can be used by hackers and criminals

Body camera police can be used by hackers and criminals

police around the world today wear body cameras. They are a useful tool that protects police, protects citizens from illegal actions of law enforcement officers, helps to fight corruption and acts as a proof of violations. But a c...

95

1 0

2018-08-14

Comments:
0
Cyclists are willing to change the helmet into a modern safety cushion for the head

Cyclists are willing to change the helmet into a modern safety cushion for the head

In Europe long enough to see cyclists who use a personal Hövding airbag instead of a helmet. The success of its products enabled him to build plans for the conquest of other markets and the release of the following model with conn...

148

1 0

2018-08-10

Comments:
0
The hacker stole the files of the U.S. army, but could not sell them even for $ 150

The hacker stole the files of the U.S. army, but could not sell them even for $ 150

the Hacker has guessed to use the vulnerability of routers to gain access to the files of the U.S. army. The obtained data he attempted to sell on the forum on the darknet, but was unable to find an interested buyer, even reducing...

144

1 0

2018-07-11

Comments:
0
New ways to protect your home

New ways to protect your home

When it comes to home security, you want to the offers on the market of security systems was not less than, for example, in the smartphone market. Not so long ago there was another player in this field. We learned that he can offe...

96

1 0

2018-06-29

Comments:
0

"Kaspersky lab" will not cooperate with Europol

"Kaspersky Lab" has carried out a reversal in the direction of Russia and decided not to cooperate with European law enforcement agencies, including Europol. This is due to the recently adopted European Parliament resolution on st...

139

1 0

2018-06-14

Comments:
0
Facebook records the movement of your lips and much other information

Facebook records the movement of your lips and much other information

In response to the request of the U.S. Congress after April with Cambridge Analytica, company Facebook revealed all its ways of collecting information about users of the social network. It needed to be out of 222 pages. He describ...

157

1 0

2018-06-12

Comments:
0
Half a million routers can be turned off VPNFilter

Half a million routers can be turned off VPNFilter

Researchers in the field of security recently discovered that at least 500 thousand routers in service among ordinary users and companies infected by malware VPNFilter, the previous version which was previously spread on the terri...

169

1 0

2018-05-24

Comments:
0
Passwords 336 million Twitter users have been compromised due to a bug

Passwords 336 million Twitter users have been compromised due to a bug

This night Twitter released a security warning, which advised 336 million of its users to change their passwords. It turned out that because of the obvious mistakes some codes were stored unprotected in the internal magazine. Howe...

184

1 0

2018-05-04

Comments:
0
Toshiba brings quantum encryption at a record distance

Toshiba brings quantum encryption at a record distance

Researchers from Toshiba invented a new way to use the laws of quantum mechanics to send secure messages using modern technology. Using their ideas it is possible to send protected data to a distance of 550 kilometers. The encrypt...

181

1 0

2018-05-03

Comments:
0
The founder of WhatsApp did not want to weaken encryption and abandoned their product

The founder of WhatsApp did not want to weaken encryption and abandoned their product

the founder of the popular WhatsApp messenger will be leaving the company Facebook. This was reported in the Washington Post, and later, Jan koum, and he wrote about his departure on his personal page. In the Washington Post as th...

168

1 0

2018-05-01

Comments:
0
In Russia using the system of facial recognition caught the first offender

In Russia using the system of facial recognition caught the first offender

In Moscow at the metro station "Frunzenskaya" police arrested a man who is wanted and hiding from investigation. The detection signal wanted by police has filed a facial recognition system cost 4 billion rubles, which was introduc...

188

1 0

2018-04-26

Comments:
0
#video | Chinese robot pours water on pedestrians-violators

#video | Chinese robot pours water on pedestrians-violators

it would Seem that difficult to obey the traffic rules? Green – movement permitted. Red – is prohibited. However, there are always those who will violate the traffic rules. And if the drivers are fighting hundreds of cameras and p...

229

1 0

2018-04-24

Comments:
0
More than 30 major IT companies sign

More than 30 major IT companies sign "a digital Geneva Convention"

the New York Times reports that more than 30 technology companies including Facebook and Microsoft plan to announce the statement, according to which they publicly refuse to participate in cyber attacks organized by the government...

186

1 0

2018-04-18

Comments:
0
Pacsafe — best backpacks bags with protection from thieves

Pacsafe — best backpacks bags with protection from thieves

the Last few years backpacks have become increasingly popular among students and even among top managers of large companies, which have not hesitate to go to subway in big cities and appreciate the format of backpack capacity. Cri...

141

1 0

2018-04-12

Comments:
0
What have you learned about the attack on 200 000 network of Cisco switches?

What have you learned about the attack on 200 000 network of Cisco switches?

the Last few days were not the best for cyber security. The Iranian Ministry of communications and information technologies reported that it has also become a victim of global cyber-attacks that (or simply switches) from Cisco, wh...

174

1 0

2018-04-08

Comments:
0
Intel will no longer defend some of their processors from vulnerabilities

Intel will no longer defend some of their processors from vulnerabilities

At the beginning of this, as of 2018, some processors of Intel was discovered that allowed attackers to steal user data which are processed in the processor. Immediately representatives of Intel said that will work on a "patch" th...

187

1 0

2018-04-06

Comments:
0
Crawler drone will prevent emergency situations at the construction site

Crawler drone will prevent emergency situations at the construction site

the Question of safety during construction works – not an empty phrase. Because the slightest mistake can lead not only to injury of one person, but to be dangerous in the future. And new technologies can help improve safety contr...

209

1 0

2018-03-28

Comments:
0