Retro technology and information security
The top-4 technologies in use today that long belong in a museum.
105 articles
The top-4 technologies in use today that long belong in a museum.
We review a recent study on biometric authentication that uses breath analysis.
Some forged Green Pass certificates on sale on the Internet pass validation tests. However, it’s still not a good idea to buy them, and here’s why.
Apple plans to use its new CSAM Detection system to monitor users and identify those who store child pornography on their devices.
How ontologies can provide the world with greater, faster protection from cyberthreats and more.
Researchers at RSA Conference 2021 demonstrated how Tesla and Mobileye autopilots can be tricked by “phantom” images.
Keys make a clicking sound when inserted in door locks. Scientists have found a way to duplicate a key using a recording of the sound.
A lightbulb is all the specialist equipment Lamphone needed to eavesdrop on a conversation in a soundproofed room.
On this episode of the podcast, Dave and Jeff discuss a new damaging attack, China’s proposal for a new Internet, parenting in the digital age, Lego, and more.
Using simple tools such as lasers and music to trick voice assistants and motion sensors.
Is there Internet on the ISS, what is it like, and how long does it take to get a message from Mars — learn about the networks of today and the future.
Eugene Kaspersky’s thoughts on the latest updates to our Earth 2050 futurological project.
Has your sat nav ever insisted you are somewhere you are clearly not? Welcome to GPS spoofing.
Artificial intelligence assists judges, police officers, and doctors. But what guides the decision-making process?
New iPhones support eSIM technology. We explain what it is and who will soon be using it.
A look at how payment information is protected on smartphones that support contactless payments.
The European Commission’s proposed ePrivacy Regulation takes effect in May 2018. Why is it a battle — and who is fighting for what?
Almost every new smartphone now lets you unlock it with your face — and that’s really bad for security.