The places where online life directly intersection with that lived offline will be forever fascinating, illustrated perfectly through a recent performance piece involving Google Maps, a cart, and an awful lot of mobile phones.
Simon Weckert, an artist based in Berlin, Germany, showed how a little ingenuity could work magic on the ubiquitous Google Maps syste
It's great to have location data stored in your photos. This allows you to sort through your photo library and find all your photos from your last vacation, or from favorite sites you like to visit. For some photos, like that one of the Eiffel Tower, it's obvious where you've taken them. But you may not want people to be able to figure out where all your pho
byPaul DucklinStories about privacy blunders by big companies always attract a lot of attention.When that big company is Apple, you can replace ‘a lot’ with ‘a whole lot’.And Apple likes to make public pitches about the privacy its products provide, like the video here:So, when renowned investigative cybersecurity journalist Brian Kre
About two weeks ago, National Cybersecurity Awareness Month (NCSAM) kicked off with a new message stressing personal responsibility for users keeping themselves safe online: “Own IT. Secure IT. Protect IT.” NCSAM asked users to consider best practices for both securing their own devices and protecting sensitive data.
But personal responsibility in cyberse
In the excitement of summer vacations, most of us forget to equip ourselves with the privacy tools and needed security measures. Yet, such flawed data security could ruin your vacations as the cyber goons always remain on work.
Therefore, here we have listed some essential steps that are must to secure your sensitive information you carry with yourself while
Information warfare – The development of cyber capabilities is strategic for any governments, computer systems and Internet of Things even more at risk.
By the mid-1990’s the US intelligence agencies, especially the NSA, were beginning to wake up to a grim reality – the world was quickly becoming connected and the tools to connect that world were no lo
The moment, when your team leader asks you to cheat at Pokémon GO…everyone knows it, right? No? Well, I do
A couple of experts demonstrated how to wirelessly change the time on NTP servers over long distances using an inexpensive equipment.
The HACK IN THE BOX conference is a hotbed of interesting hacks, today I will present you the results of a research conducted by the researchers Yuwei Zheng and Haoqi Shan from Qihoo360 firm that explained how a remote attack
Maritime industry heavily depends on technology, a cyber attack against its infrastructure and systems could have dramatic consequences on our society.
In a recent post, I talked about attacks targeting SCADA systems will increase, and our ports are among critical infrastructure that makes large use of such systems.
Let’
Law enforcement identifies and located suspects members of a criminal organization that used gas pump skimmers, by using the GPS technology.
The number of attacks against ATMs located in supermarkets and Gas pumps is constantly increasing, the crooks use credit and debit card skimmers that use different technologies to steal c
Credit and debit card skimmers secretly attached to gas pumps are an increasingly common scourge throughout the United States. But the tables can be turned when these fraud devices are discovered, as evidenced by one California police department that has eschewed costly and time-consuming stakeouts in favor of affixing GPS tracking devices to the skimmers an
Позавчера утром появилась первая информация о том, что в ночь с шестого на седьмое августа над воздушным пространством Нижнего Новгорода и Воронежа наблюдалась массовая пропажа сигнала системы GPS. Разные источники утверждают, что экстренные сообщения поступили примерно от дюжины самолетов компаний «Трансаэро», «Ютэйр» и «Оренбургские авиалинии». К насто