How Hackers Can Spy on You by Tracking the Motion of Your Phone

Researchers at Newcastle University have recently revealed that malicious websites and apps can spy on users simply by using information from the motion sensors found in their smartphones. This way, hackers are able to decipher and steal PINs and passwords from unsuspecting people. According to a new research, by analyzing the movement of the device …

New Service Enables Any Website to Join the Tor Network

The Onion Router -or more famously Tor – the free software that enables anonymous communication and offers extra privacy online, has announced a new, unique service that will enable any website to have a presence on its network. Previously, hosting a website on the Tow network meant that developers and site owners had to make …

Don’t Change Your Passwords Too Often

Most of us know that if we want to protect our privacy we need to choose complex passwords, not reuse them over and over again, and of course, we need to change them often. However, according to the FTC (Federal Trade Commission), this last part could be doing more harm than good. If this left …

New System for Disguising Database Queries Protects Users’ Privacy

Today, most websites entail a database query. This serves many purposes; for example, it’s used to look up airline flights or to find the quickest driving route between two destinations. Although obviously useful, online database queries can also be used for unwanted user profiling. Also, some travel sites have been known to use them for …

Updated Firefox Offers Better Internet Security

Version 52 awaits Firefox browser for desktop, and with it, better internet security for its users. The new version adds a few new features, including a warning for non-secure websites, Strict Secure Cookies specification, and support for WebAssembly. Mozilla’s new warning for Firefox brings a message “This connection is not secure” to its users. This …

Scientists Invent “Lip Password”

Researchers from the Hong Kong Baptist University (HKBU) have invented a new, more secure method for authentication – “lip motion password”. This technology uses a person’s lip movement to create a password, making it a valuable addition to various security systems. Professor Cheung Yiu-ming from the Department of Computer Science, HKBU, and his team of …

How to Defend Against Future Quantum Computing Attacks

When it comes to technology, our future is bright: personalized medical devices, superfast computers, robots assistants, and of course quantum computers are just some of the things that what await us. However, with more progress comes more responsibility, and we need to be prepared for potential dangers that the new technology could bring. Take quantum …

Protecting Power Grids from Hackers

When hackers target power infrastructures, they usually focus on the mechanisms that control it so they can cause power outages, blackouts, and economic losses. To improve the system’s security and reliability, it’s crucial to first understand its vulnerabilities, which are both physical and intangible. Lead author of the new study that focuses on the physical …

Heartbeat as Encryption Key for Electronic Records

You can never be too secure, but the researchers at the Binghamton University have gone a step further by developing a new way to protect personal electronic health records – using heart’s electrical pattern as an encryption key. The researchers explain that the traditional encryption solutions are complex and expensive, making them impractical for telemedicine …

HTTPS Has Reached the ‘Moment of Critical Mass’

According to cybersecurity researcher Troy Hunt, HTTPS (Hypertext Transfer Protocol Secure) has finally reached the “moment of critical mass”: its usage has grown so much that it’s becoming the norm, rather than the exception. HTTPS is a protocol for secure communication over Internet. It consists of communication over HTTP within connection encrypted by TLS. Basically, …

Design a site like this with WordPress.com
Get started