Tag Computer security - results: 26

As criminals can use artificial intelligence? The most dangerous variant

As criminals can use artificial intelligence? The most dangerous variant

Artificial intelligence capable of much. For example, it can replace the face of Arnold Schwarzenegger Sylvester Stallone the Last 10 years, every day we hear news about how this or that artificial intelligence has learned new ski...

2329

1 0

2020-08-07

Comments:
1
Technology spy on users: how and why companies collect personal data

Technology spy on users: how and why companies collect personal data

App TikTok developed in China, whose government engages in pervasive surveillance of its own citizens. do you think you are being followed? While you ponder the answer, let us recall that almost every action is passive observation...

5409

1 0

2019-12-16

Comments:
0
Apps vs browser: where it is safer to communicate?

Apps vs browser: where it is safer to communicate?

What is safer: instant messengers or browsers? the XXI century — age of mobile applications and various social networks by interests. Worrying about the safety of the data of their users, developers from all over the world a...

5224

1 0

2019-12-11

Comments:
0
Who invented the computer password?

Who invented the computer password?

What you see when you turn on your computer, laptop or smartphone? If you're a family man, or you important the safety of personal data, most likely, before you open the screen with a field to enter the password from the computer....

3667

1 0

2019-07-22

Comments:
0
Hackers broke into the NASA server, using a cheap Raspberry Pi computer

Hackers broke into the NASA server, using a cheap Raspberry Pi computer

Can the U.S. jet propulsion Laboratory NASA (JPL) and produces some of the most high-tech things on the planet, for example, the same and space telescopes, but it turns out that she has experienced very serious problems with cyber...

3701

1 0

2019-06-23

Comments:
0
Algolux introduced the Ion platform, the development of Autonomous observation systems

Algolux introduced the Ion platform, the development of Autonomous observation systems

Algolux, established in 2015, is not yet particularly well-known in a crowded field of automotive computer vision. However, this startup from Quebec attracted the attention of investors. For example, last may the company raised $ ...

3044

2 0

2019-03-11

Comments:
0
USB-C will allow you to identify

USB-C will allow you to identify "your" chargers

-C is being improved and will soon begin to protect smartphones — including from viruses. Future smart phones may begin to learn designed just for them charger. Today mobile devices — mostly smartphones — play i...

3531

1 0

2019-01-03

Comments:
0
The scientists said, can be dangerous quantum computers

The scientists said, can be dangerous quantum computers

  Quantum computers are fundamentally different from classic software , and therefore provide a fast interaction with huge amounts of data. At the moment they are underdeveloped, but in the future will certainly raise machin...

4352

1 0

2018-12-14

Comments:
0
How to maintain your anonymity on the Internet (and a good save)

How to maintain your anonymity on the Internet (and a good save)

it May seem that lately, VPN services have become very much, but actually their number is slightly increased — just the need for gaining access to the particular site has increased dramatically. Besides, in order to use the ...

4453

1 0

2018-11-06

Comments:
1
IBM will use AI to address problems of cybersecurity

IBM will use AI to address problems of cybersecurity

In recent years, hackers and other cybercriminals invent new means to steal data or harm to companies and individuals. And sometimes to protect standard techniques are no longer enough, but to secure cyberspace has solved a major ...

3848

1 0

2018-10-16

Comments:
0
Google wants to

Google wants to "kill" the URL in the name of security users

Google Engineers are going to arrange another reform on the Internet. The Google Chrome browser already eradicates the HTTP Protocol, marking using his sites as unsafe and forcing administrators to move to HTTPS encryption. Accord...

3989

1 0

2018-09-06

Comments:
0

"Kaspersky lab" will not cooperate with Europol

"Kaspersky Lab" has carried out a reversal in the direction of Russia and decided not to cooperate with European law enforcement agencies, including Europol. This is due to the recently adopted European Parliament resolution on st...

3675

1 0

2018-06-14

Comments:
0
Half a million routers can be turned off VPNFilter

Half a million routers can be turned off VPNFilter

Researchers in the field of security recently discovered that at least 500 thousand routers in service among ordinary users and companies infected by malware VPNFilter, the previous version which was previously spread on the terri...

3875

1 0

2018-05-24

Comments:
0
What have you learned about the attack on 200 000 network of Cisco switches?

What have you learned about the attack on 200 000 network of Cisco switches?

the Last few days were not the best for cyber security. The Iranian Ministry of communications and information technologies reported that it has also become a victim of global cyber-attacks that (or simply switches) from Cisco, wh...

3539

1 0

2018-04-08

Comments:
0
Intel will no longer defend some of their processors from vulnerabilities

Intel will no longer defend some of their processors from vulnerabilities

At the beginning of this, as of 2018, some processors of Intel was discovered that allowed attackers to steal user data which are processed in the processor. Immediately representatives of Intel said that will work on a "patch" th...

3909

1 0

2018-04-06

Comments:
0
Employees of

Employees of "Kaspersky Lab" found unkillable computer virus

Almost every day on the world wide web to discover some new computer viruses. And very seldom happens so that viruses cannot be destroyed. Moreover, a rare virus is able to hide the years, from anti-virus developers. But, accordin...

4359

1 0

2018-03-13

Comments:
0
Avast has developed an AI system for the protection of IoT from the rest of the miners

Avast has developed an AI system for the protection of IoT from the rest of the miners

Hidden cryptocurrency is starting to become more rampant. Hackers earn money using for mining other people's computers, smartphones and other «smart» device. At the world mobile Congress company Avast said about the exte...

3561

1 0

2018-03-02

Comments:
0
Servers on Linux and Windows massively affects virus-miner

Servers on Linux and Windows massively affects virus-miner

cybersecurity Experts from companies Check Point, Ixia and Certego found that more than 700 servers on Windows and Linux infected by malicious software RubyMiner used for covert cryptocurrency. The first attack was noticed last we...

3721

1 0

2018-01-18

Comments:
0
DARPA resumed work on the

DARPA resumed work on the "uncrackable" computer Morpheus

Cybersecurity in recent years has become particularly relevant for investment not only large corporations, but also the military. In light of recent events, when the worm WannaCry suddenly knocked out more than 300 000 computers w...

3829

1 0

2017-12-21

Comments:
0
Named list of the worst passwords of 2017

Named list of the worst passwords of 2017

the Company SplashData, specializing in providing information security services, annually makes the list of most popular passwords, based on millions of stolen logins, which end up in open access. And every year we never cease to ...

3823

1 0

2017-12-20

Comments:
0