
How secure is your password manager?
We look at how secure password managers are against hacks, and how to protect your passwords as much as possible.
94 articles
We look at how secure password managers are against hacks, and how to protect your passwords as much as possible.
A new generation of chatbots creates coherent, meaningful texts. This can help out both cybercriminals and cyberdefenders.
Everybody knows that we should prepare ourselves for a “quantum future”, but it was expected to come about in 10-20 years’ time. Is a breakthrough possible this year?
Avast solutions have a pretty good reputation, but a handful of incidents call their safety into question. Read on to learn whether Avast can be trusted.
In the final part of the series, we take a look at cryptocurrency politics, the future, and the metaverse.
In this second part of the series, we’re going to dive deep into Ethereum and its novelties: smart-contracts, DAOs and NFTs.
Everything you’ve always wanted to know about crypto on the whole, and NFTs in particular, and also why I’m not a fan of such tech, to say the least.
Apple’s new feature promises enhanced protection in the fight against targeted attacks.
We review a recent study on biometric authentication that uses breath analysis.
We explore the latest method for detecting hidden cameras and microphones described in one of the year’s best studies on personal security.
Can a device be hacked when switched off? Recent studies suggest so. Let’s see how this is even possible.
Most third-party apps for connected cars require access to your account with the manufacturer. But are they secure?
Let’s see how Google, Microsoft and Apple can work together to do away with passwords.
We explain what a smartphone’s ToF sensor is and how researchers from Singapore propose using it to find hidden cameras.
Some forged Green Pass certificates on sale on the Internet pass validation tests. However, it’s still not a good idea to buy them, and here’s why.
Apple plans to use its new CSAM Detection system to monitor users and identify those who store child pornography on their devices.
How Zoom security is evolving, what threats are still current, and how developers plan to eliminate them.
We’ve been using machine learning in Kaspersky Internet Security for Android for years now. Here’s why — and what we’ve achieved.
Researchers at RSA Conference 2021 demonstrated how Tesla and Mobileye autopilots can be tricked by “phantom” images.