Tag Security - results: 80

Hackers will receive the money and car for hacking a Tesla Model 3

Hackers will receive the money and car for hacking a Tesla Model 3

Tesla is trying by all means to protect its electric cars from breaking, and it's definitely something to work with. Proof of this are numerous — for example, once the hackers from Belgium are the Model S and to open car doors. To...

10

1 0

2019-01-16

Comments:
0
USB-C will allow you to identify

USB-C will allow you to identify "your" chargers

-C is being improved and will soon begin to protect smartphones — including from viruses. Future smart phones may begin to learn designed just for them charger. Today mobile devices — mostly smartphones — play i...

51

1 0

2019-01-03

Comments:
0
Hackers have bypassed one of the most complex security systems

Hackers have bypassed one of the most complex security systems

Experts in the field of computer security, spoke about how hackers can easily circumvent the authorization system based on scanning and analysis of the subcutaneous blood vessels. How this is done, the researchers of biometric aut...

72

1 0

2018-12-30

Comments:
0
Tesla has enhanced the security of their cars just by changing the lights

Tesla has enhanced the security of their cars just by changing the lights

car Manufacturers are trying to achieve maximum safety of its equipment. To do this, they equip their protective systems, automatic piloting, durable bodies and do achieve good results. In September, Tesla Model 3 electric cars ha...

54

1 0

2018-12-27

Comments:
0
The scientists said, can be dangerous quantum computers

The scientists said, can be dangerous quantum computers

  Quantum computers are fundamentally different from classic software , and therefore provide a fast interaction with huge amounts of data. At the moment they are underdeveloped, but in the future will certainly raise machin...

64

1 0

2018-12-14

Comments:
0
How to set unlimited VPN for $ 1

How to set unlimited VPN for $ 1

VPN Services in Russia have become markedly more popular over the last couple of years. No wonder, because it's a great way to go to the sites, access to which for some reason is closed for Russian users (for example, set up Spoti...

74

1 0

2018-12-06

Comments:
0
3D printers released into the air hazardous substances

3D printers released into the air hazardous substances

Printers 3D printing is not only used for making plastic figures and details, but also for the creation of complex structures such as . At their convenience and benefits there is no doubt that fact that their price is already low ...

147

1 0

2018-11-13

Comments:
0
How to maintain your anonymity on the Internet (and a good save)

How to maintain your anonymity on the Internet (and a good save)

it May seem that lately, VPN services have become very much, but actually their number is slightly increased — just the need for gaining access to the particular site has increased dramatically. Besides, in order to use the ...

161

1 0

2018-11-06

Comments:
0
IBM will use AI to address problems of cybersecurity

IBM will use AI to address problems of cybersecurity

In recent years, hackers and other cybercriminals invent new means to steal data or harm to companies and individuals. And sometimes to protect standard techniques are no longer enough, but to secure cyberspace has solved a major ...

195

1 0

2018-10-16

Comments:
0
Honda built in the USA

Honda built in the USA "smart intersection"

security traffic — is extremely important task. And, by and large, in the regulation of the situation on the roads has not changed over the past half century. Traffic markings Yes road signs — that, in fact, the entire...

215

1 0

2018-10-09

Comments:
0
Virtual Singapore launched the most ambitious digital project in the history of

Virtual Singapore launched the most ambitious digital project in the history of

Singapore is one of the most technologically advanced cities in the world, and in the future in this field his position, most likely, will be strengthened. In addition to testing the most recent developments like unmanned flying v...

226

1 0

2018-09-29

Comments:
0
How will

How will "special security blanket" from Volvo

recently, Volvo introduced an Autonomous electric concept car called the 360c, which included "a special security blanket" (similar to seat belts and airbags) for when you will sleep in a horizontal position in the car. This blan...

208

1 0

2018-09-08

Comments:
0
Google wants to

Google wants to "kill" the URL in the name of security users

Google Engineers are going to arrange another reform on the Internet. The Google Chrome browser already eradicates the HTTP Protocol, marking using his sites as unsafe and forcing administrators to move to HTTPS encryption. Accord...

246

1 0

2018-09-06

Comments:
0
The Intel found 3 vulnerabilities. They allow you to steal

The Intel found 3 vulnerabilities. They allow you to steal

Today Intel announced three new vulnerabilities of their processors. According to the American company, these vulnerabilities can be exploited to gain access to some data stored in the computer memory. Under the threat of a proces...

286

1 0

2018-08-15

Comments:
0
Body camera police can be used by hackers and criminals

Body camera police can be used by hackers and criminals

police around the world today wear body cameras. They are a useful tool that protects police, protects citizens from illegal actions of law enforcement officers, helps to fight corruption and acts as a proof of violations. But a c...

275

1 0

2018-08-14

Comments:
0
Cyclists are willing to change the helmet into a modern safety cushion for the head

Cyclists are willing to change the helmet into a modern safety cushion for the head

In Europe long enough to see cyclists who use a personal Hövding airbag instead of a helmet. The success of its products enabled him to build plans for the conquest of other markets and the release of the following model with conn...

311

1 0

2018-08-10

Comments:
0
The hacker stole the files of the U.S. army, but could not sell them even for $ 150

The hacker stole the files of the U.S. army, but could not sell them even for $ 150

the Hacker has guessed to use the vulnerability of routers to gain access to the files of the U.S. army. The obtained data he attempted to sell on the forum on the darknet, but was unable to find an interested buyer, even reducing...

340

1 0

2018-07-11

Comments:
0
New ways to protect your home

New ways to protect your home

When it comes to home security, you want to the offers on the market of security systems was not less than, for example, in the smartphone market. Not so long ago there was another player in this field. We learned that he can offe...

248

1 0

2018-06-29

Comments:
0

"Kaspersky lab" will not cooperate with Europol

"Kaspersky Lab" has carried out a reversal in the direction of Russia and decided not to cooperate with European law enforcement agencies, including Europol. This is due to the recently adopted European Parliament resolution on st...

259

1 0

2018-06-14

Comments:
0
Facebook records the movement of your lips and much other information

Facebook records the movement of your lips and much other information

In response to the request of the U.S. Congress after April with Cambridge Analytica, company Facebook revealed all its ways of collecting information about users of the social network. It needed to be out of 222 pages. He describ...

332

1 0

2018-06-12

Comments:
0