The convoluted art of making private and anonymous phone calls
A New York artist made an exhibition out of making a single private and anonymous cell phone call outside the scope of government spying. Here’s how he did it:
99 articles
A New York artist made an exhibition out of making a single private and anonymous cell phone call outside the scope of government spying. Here’s how he did it:
Major social networks have been known to either unbundle their functionality into multiple apps, or buy other apps and not integrate their functionality into the main one.
Mark Zuckerberg has officially allowed dozens of popular apps to operate within the realm of his Facebook Messenger
The design of the current smartwatches is defined by being aimed at geeks. It looks like it will again take Apple to perform its duties carefully iSplaining wearables to ordinary people.
When it comes to Mobile OSes, every 3rd option conversation these days mentions the need for some “true openness”. But do we really need this kind of openness?
WhatsApp has finally released a Web version of its popular mobile messaging service. We take a look at it from the security perspective.
Are you getting enough sleep at night? If not, it might be because your sleep pattern is disrupted due to the display on your PC, TV, tablet, and smartphone.
We collected the 10 best tweets related to an IT security event in 2014.
We have seen a number of cases where a user has deleted our product for Android and ended up with a locked device. Here we discuss why this happens and what can be done about it.
Let’s take a moment to discuss the numerous troubles that our bright, technology-packed future could bring about.
By default, your iPhone’s OS is set to give you the best performance instead of the best battery life. But you can change that!
Everyday millions of computers solve the same problem; these machines try to check if you are actually you and not some other person. The most popular tool to do that
On July 31st at the Black Hat conference in Las Vegas, Security Research Lab’s (SRL) Karsten Nohl presented research on the SIM security flaw. Nohl experimentally demonstrated the vulnerability, which
It was predicted, it was feared, and the day has come. An Android Trojan that has the ability to steal money from bank accounts has emerged in Russia. We have
If there’s one group of people who love vacation more than the vacationers themselves, its thieves. Tourists and travelers have always made easy marks for criminals, but now that everyone