Driverless Cars: How to Have Breakfast While Steering
One of the most highly anticipated prospects of the 21st century has been the possibility of enabling robots to drive cars. But how soon could this be possible?
126 articles
One of the most highly anticipated prospects of the 21st century has been the possibility of enabling robots to drive cars. But how soon could this be possible?
It’s not always easy to give general advice to Android users because the OS is so very diverse. But we have ten security tips that are relevant for almost any Android version.
Google’s mobile operating system joins Apple’s iOS in offering full disk encryption by default to all users in its newest version — Android 5.0 aka Lollipop.
Data breaches have become a routine. It can happen to any site, any day. You can’t prevent it, but there is a way to minimize the damage.
Making a case for password reuse, Google hiring hackers to fix the Internet, Apple bolsters security across its services with strong Crypto, plus various fixes and more.
Google is releasing a tool that ensures all data passing out of its Chrome browser is encrypted in transit, resolving the problem of relying on others’ crypto.
Adults can choose to face the financial consequences of their own actions, but they may want to know how to prevent their kids from running up exorbitant credit card bills tied to the parents’ iTunes or Google Play accounts.
A brief video tutorial on how to enable a number of important security and privacy features built into Google’s Gmail service.
OpenID and OAuth are protocols responsible for those “Login with Facebook” and “Authorize with Google” buttons you see on almost every site nowadays. Of course, there is a hack for that™, but you don’t need neither panic nor change your password. Read on for our simple action plan.
It appears that PCs are not only able to spy on you via cameras, but they’re also able to listen in on you on as well, and in a discreet
It’s no secret to anyone to know that Google keeps every bit of data it collects about each of its users. This data includes, but is not limited to, search
For most of us, our digital devices are incredibly important possessions. They hold our most important personal information like photos, passwords and account info, and travel with us on a
Google provides some pretty strong security controls like two-factor authentication in order to prevent hackers from hijacking your account and other controls that allow you to recover your account in
A little over a year ago, most of us woke up one day and discovered that Google Docs was gone, replaced by this weird new thing called Google Drive. Then
We recently wrote about the conspicuous lack of privacy discussion at Google’s recent I/O Conference in San Francisco. While it’s true that there wasn’t much talk of privacy at the
Google Glass was among the main attractions at the Mountain View, California search giant’s developer-centric I/O conference in San Francisco last week. We had high hopes that Google would address
If we’re to believe all the headlines this week, then it appears that the one-time search giant Google has finally shipped off developer-models of Google Glass – their oft-mocked, thoroughly
The password has become the black sheep of the security world, ostracized for its inability to actually protect users’ accounts and the laughable ease with which attackers can crack or
Google’s social networking site, Google+, continues to grow in popularity. But as with all social media sites, over-sharing your personal information is easy to do on Google+. Use these 10
The phrase targeted attack looks to be redundant at first glance. Of course an attack is targeted. What good would it be without a target? But the reality is that
If you’re a regular DropBox user, you may have noticed that your inbox has been full of spam this summer. Well, DropBox noticed it too (they had it pointed out