
BLOG
Researchers at University College London have created a fascinating algorithm that can take a sample of hand-written text, and imitate it with eerie similarity. At first glance, that might seem like a...
Adobe’s beleaguered Flash player may finally be seeing its last days, at least if Google has anything to say about it. The player has been exceedingly popular, and at its peak, a vast number of...
Microsoft is a company that definitely understands the need for better and more secure information systems. Like many other tech companies, they’ve been pushing hard for two-factor authentication...
Remember not long ago, when the big credit card issuers went on at some length touting their latest advances in smart chip technology? The new tech was supposed to vastly improve the security of...
There have been a number of scams in recent years involving malware that creates false flag problems on your desktop. The faux problem is presented, along with a phone number you can call to get help...
Printing company MOO Labs has just brought the humble business card into the information age. Employing the same NFC (Near Field Communications) technology that makes it possible to make a credit card...
The unfortunate reality is that most instances of hacking occur from within a company itself. It’s true that the high profile cases that make the news are successful breaches from outside the company...
Do you trust what your eyes tell you? If you’re looking at a computer monitor, that trust might be misplaced. At a recent DEFCON presentation in Las Vegas, researchers demonstrated how it’s possible...
Does your company rely on Oracle Systems’ Micros to handle point of sale transactions? If so, you should change your password immediately. The company has recently reported that a sophisticated...