HackDig : Dig high-quality web security articles for hacker

Bionic employees and biohacking

Wireless chips are an increasingly important part of day-to-day life. We use contactless cards to pay for goods, they have replaced travel tickets, and many people even use embedded chips to access their offices at work. But almost every chip required another plastic card – pretty soon you end up with a wallet full of contactless cards. Which is why some ind
Publish At:2017-09-26 20:45 | Read:253 | Comments:0 | Tags:Mobile News Technology cybersecurity Hackers

Artificial Intelligence: Myth and Reality

As Artificial Intelligence (AI) begins to find practical applications in day-to-day life, we are hearing more and more about it. In amongst the success stories are countless warnings of a Terminator-like future where self-aware robots take over the world. So how can you separate fact from fiction, and could humanity really be eradicated by intelligent comput
Publish At:2017-09-19 22:50 | Read:141 | Comments:0 | Tags:Mobile News Technology artificial intelligence technology

Oreo and the sweet history of Android versions

Oreo Android, the sweetest version? What does an Oreo cookie, a donut, a marshmallow or a lollipop have to do with your smartphone? Well, believe it or not, the names of all those sweets indicate the Android operating system installed on your cell phone. After months of speculation about the new features to be included in the new Android operating system, Au
Publish At:2017-08-29 02:40 | Read:315 | Comments:0 | Tags:Mobile News Mobile Security Technology Android smartphones

Facebook Telepathy Texting – Could It Be Hacked?

Is telepathy texting the next step in technology communications? With over 2 billion registered members, Facebook is the world’s most popular online service. But to maintain that title, Facebook is constantly developing new services to keep people logging in. In a recent video conference, Facebook chief Mark Zuckerberg discussed one of the cutting edge proje
Publish At:2017-08-25 06:35 | Read:334 | Comments:0 | Tags:Mobile Security News Social Media Facebook social media tech

Boarding Passes May Soon Be Part of the Past with Biometric

Are the Biometric security sistem safe? Back in June, the Department of Homeland Security (DHS) released a privacy impact assessment update for the Traveler Verification Service (TVS). The update is aimed at international travelers and reveals further developments and expanding on the biometric entry-exit airport system throughout the US. Intended to improve
Publish At:2017-08-22 01:55 | Read:217 | Comments:0 | Tags:Mobile News Technology cybersecurity

Hackers target energy and utility firms

Why cyber warfare is becoming so important In the early stages of any war, the first action is to try and disrupt the infrastructure of an enemy. In recent years, this means risking people’s lives to bomb key infrastructure, like power plants, bridges and fuel depots. With key utilities crippled, society quickly breaks down, making it very hard for the count
Publish At:2017-08-18 05:50 | Read:191 | Comments:0 | Tags:Mobile News Technology cybersecurity Hackers

Artificial Intelligence (AI) – Pros and Cons

What are the pros and cons of AI? Mark Zuckerberg and Elon Musk have been debating about the future of artificial intelligence (AI) for quite some time. Last month they continued the conversation by making their debate public. During a Q&A session with Nevada’s governor Brian Sandoval, Elon made a few statements about the dangers of AI. Tesla’s CEO said
Publish At:2017-08-17 11:25 | Read:146 | Comments:0 | Tags:Mobile News Technology AI artificial intelligence cybersecur

Your Roomba wants to sell your home’s map

Earlier this week iRobot CEO Colin Angle shared with Reuters that the data collected by iRobot devices (such as Roomba) over the years may eventually be shared with third parties. Even though iRobot’s robotic vacuum cleaners are not as smart as R2-D2, some of the high-end models, such as the $900 Roomba 980 robotic vacuum cleaner, are known to contain sophis
Publish At:2017-07-28 14:20 | Read:335 | Comments:0 | Tags:Family Safety Technology IoT robotics smarthome

Does Apple Watch 3 have a chance against the competition?

Apple’s latest smartwatch is expected to hit the shelves early next year, and even though now it is midsummer, the rumors around the product have already begun circulating. Some of the top rumors for Apple’s Series 3 watch suggest that cellular integration will finally arrive for Apple watches. Speculators also mention the latest edition of the product is ve
Publish At:2017-07-27 11:30 | Read:280 | Comments:0 | Tags:Technology Apple iwatch smartwatch

Internet for everyone with Facebook’s drone Aquila

Last month Facebook announced the second successful test of Aquila – a giant sun powered drone. Even though the technology is still in the makes and has a long way to go, Mark Zuckerberg has been very serious about connecting the world– Facebook recently surpassed the 2 billion users mark.  There is an opportunity for Facebook to continue its path of success
Publish At:2017-07-21 07:50 | Read:254 | Comments:0 | Tags:Technology drone Facebook Internet Security

The apparent difficulty of implementing email encryption in Gmail

It’s been almost three years since Google first announced its intention to add end-to-end encryption to Gmail. However, the free email service is yet to provide users with that feature. Despite the Internet giant insists that it was never a bluff, one of the company’s latest movements has reignited the criticism. Recently, a spokesperson from Goo
Publish At:2017-06-14 11:50 | Read:567 | Comments:0 | Tags:Security end-to-end encryption Gmail Google Privacy technolo

How to build a safe smart home?

Building a smart home is not hard at all… Coming home to a pre-heated house, being able always to monitor what is going on at home, knowing that if the emergency alarm sets you will not only get a notification on your cell so you can inform the authorities, but you will have a device that will start recording everything that is going on. It all sounds
Publish At:2017-06-13 17:25 | Read:396 | Comments:0 | Tags:Mobile News Technology cybersecurity IoT

Keyloggers: Be careful what you type

Are you one of those people who covers the keypad with their hand when they enter their PIN into an ATM? And when entering it into the supermarket’s credit card terminal? This basic (but effective) security measure does not require much effort and is increasingly common among users, who understand the need to take precautions to protect their banking t
Publish At:2017-06-09 21:20 | Read:565 | Comments:0 | Tags:Security companies cyberattacks keyloggers technology

Can someone hack my drone?

Drones are gaining more and more popularity here in the US. They are no longer only a military tool able to operate thousands of miles away from us, but an easily accessible product available in almost every consumer electronics store in the US. Well, most of the ones sold in the stores may not be as powerful as the military ones, but they still are flying d
Publish At:2017-05-31 09:15 | Read:495 | Comments:0 | Tags:Mobile News Technology cybersecurity Hackers

The US Cyberwarfare Campaign Against North Korea’s Nuclear Program

North Korea launched this weekend another medium- range missile in just over a week of the previous test, this time with success. The beef between the North Korean regime and the US is so thick, you’d need to slow roast it for the better part of a day just to get it tender. The two world powers find themselves in a political game of chicken once again as Ki
Publish At:2017-05-24 11:35 | Read:557 | Comments:0 | Tags:Security cyberwarfare Malware technology

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud