HackDig : Dig high-quality web security articles for hacker

Do Americans Think Their Phone Is Listening To Them? (Survey)

Microphones on your devices were created to make life simpler. Not sure what song is playing on the radio? Ask Siri to listen and tell you what the artist is. Need to call your mom but you’re in the middle of cooking dinner? Ask Alexa to make the call for you. The mics in our devices allow us to go hands-free and multitask.  The problem with online microphon
Publish At:2019-11-11 22:35 | Read:6 | Comments:0 | Tags:Mobile Security Panda Security Security Technology cybersecu

Problems with your pc? When to use Panda’s free technical support

Panda Security is well-known for its expertise in detecting, preventing and removing malware infections. But as any PC owner knows, there’s a lot of other things that can go wrong. The sort of problems that take time and expertise to fix. So we’ve made your Panda Dome subscription even better. Now anyone with a valid subscription can get free technical suppo
Publish At:2019-10-28 10:35 | Read:253 | Comments:0 | Tags:Mobile News Panda Security cybersecurity security technology

The Complete Guide to Facial Recognition Technology

Have you ever wondered why your face is scanned at customs when you enter a country? Or how the new iPhone is able to unlock using your face instead of a password? The answer is facial recognition technology (also called FRT). What is Facial Recognition? Techopedia defines facial recognition as, “a biometric software application capable of uniquely identifyi
Publish At:2019-10-11 22:40 | Read:396 | Comments:0 | Tags:Panda Security Technology

Do humans listen to the recordings made by smart assistants?

Smart assistants such as Siri, Alexa, and Google Home record snippets of your commands. However, they are not the only ones keeping a record of your voice commands or messages – Facebook’s Messenger app, and Apple’s Messages also record your voice. The tech giants use voice recording to improve their services, and this sometimes involves human review. Most o
Publish At:2019-10-10 10:35 | Read:276 | Comments:0 | Tags:Mobile News privacy Technology cybersecurity Privacy

Cyber security and sustainability – being a better global citizen

The impact of human activity on the environment is becoming clearer every day – and it’s obvious that we face some significant challenges in the near future. Climate change is now a headline issue and we’re all being urged to do our bit by reducing carbon emissions. It’s no surprise then that most people think of ‘sustainability’ in terms of environmental is
Publish At:2019-10-09 10:35 | Read:215 | Comments:0 | Tags:Mobile News Technology Tips

What is Alexa and how does she work?

Amazon Alexa appears on smart speakers and mobile phones, offering friendly assistance and advice on demand. She can manage your diary, play music, answer questions, order groceries from Amazon and control your smart home devices. But what actually is Alexa? What is Alexa doing? When Amazon describes Alexa as a ‘personal assistant’, they underplay much of he
Publish At:2019-09-30 10:35 | Read:216 | Comments:0 | Tags:Mobile News Panda Security Technology

Smart camera privacy – what you need to know

As the cost of smart home technology falls, more of us are installing internet connected devices. Smart plugs, smart speakers, smart lights and now smart cameras, all designed to make our lives slightly easier. Smart cameras are increasingly popular. They allow us to check in on our sleeping babies, our elderly relatives or our pets. We can see who’s at the
Publish At:2019-09-26 10:35 | Read:281 | Comments:0 | Tags:Mobile News Technology Tips cybersecurity Smart camera

Should you ditch charging cables?

The latest Android and Apple smartphones all offer a new technology called ‘inductive charging’. You simply place the phone on a compatible ‘pad’ and the battery recharges wirelessly. Obviously this is great news for those of us who regularly lose our charging cables, or struggle to insert the plug correctly. But is inductive charging as useful as the manufa
Publish At:2019-09-23 10:35 | Read:168 | Comments:0 | Tags:Mobile News Technology Charging cybersecurity smartphones Wi

How secure is the new iPhone 11?

Apple officially announced its latest series of mobile phones at an event in Silicon Valley. The new iPhone 11 series have already become available for preorder on Sept 13th and are expected to start shipping on the 20th. The new iPhone comes in three versions – 11, Pro and Pro Max. The significant difference between the three devices is the size, the
Publish At:2019-09-19 17:05 | Read:93 | Comments:0 | Tags:Mobile News News cybersecurity news technology

Bionic employees and biohacking

Wireless chips are an increasingly important part of day-to-day life. We use contactless cards to pay for goods, they have replaced travel tickets, and many people even use embedded chips to access their offices at work. But almost every chip required another plastic card – pretty soon you end up with a wallet full of contactless cards. Which is why some ind
Publish At:2017-09-26 20:45 | Read:3023 | Comments:0 | Tags:Mobile News Technology cybersecurity Hackers

Artificial Intelligence: Myth and Reality

As Artificial Intelligence (AI) begins to find practical applications in day-to-day life, we are hearing more and more about it. In amongst the success stories are countless warnings of a Terminator-like future where self-aware robots take over the world. So how can you separate fact from fiction, and could humanity really be eradicated by intelligent comput
Publish At:2017-09-19 22:50 | Read:2602 | Comments:0 | Tags:Mobile News Technology artificial intelligence technology

Oreo and the sweet history of Android versions

Oreo Android, the sweetest version? What does an Oreo cookie, a donut, a marshmallow or a lollipop have to do with your smartphone? Well, believe it or not, the names of all those sweets indicate the Android operating system installed on your cell phone. After months of speculation about the new features to be included in the new Android operating system, Au
Publish At:2017-08-29 02:40 | Read:3364 | Comments:0 | Tags:Mobile News Mobile Security Technology Android smartphones

Facebook Telepathy Texting – Could It Be Hacked?

Is telepathy texting the next step in technology communications? With over 2 billion registered members, Facebook is the world’s most popular online service. But to maintain that title, Facebook is constantly developing new services to keep people logging in. In a recent video conference, Facebook chief Mark Zuckerberg discussed one of the cutting edge proje
Publish At:2017-08-25 06:35 | Read:4104 | Comments:0 | Tags:Mobile Security News Social Media Facebook social media tech

Boarding Passes May Soon Be Part of the Past with Biometric

Are the Biometric security sistem safe? Back in June, the Department of Homeland Security (DHS) released a privacy impact assessment update for the Traveler Verification Service (TVS). The update is aimed at international travelers and reveals further developments and expanding on the biometric entry-exit airport system throughout the US. Intended to improve
Publish At:2017-08-22 01:55 | Read:3252 | Comments:0 | Tags:Mobile News Technology cybersecurity

Hackers target energy and utility firms

Why cyber warfare is becoming so important In the early stages of any war, the first action is to try and disrupt the infrastructure of an enemy. In recent years, this means risking people’s lives to bomb key infrastructure, like power plants, bridges and fuel depots. With key utilities crippled, society quickly breaks down, making it very hard for the count
Publish At:2017-08-18 05:50 | Read:2752 | Comments:0 | Tags:Mobile News Technology cybersecurity Hackers


Share high-quality web security related articles with you:)


Tag Cloud