BUSINESS

Ultrasonic spyware - what only your dog detects

Sven Krumrey

A four-legged security solution

Spyware, whether distributed by criminals, advertisers or even states, is a constant nuisance. Yet, some types have the technician in me marveling. Why? Because they're innovative and intelligently designed. Recently, I came upon an approach that might interest web users, supermarket shoppers and whistleblowers alike. A single sound can betray them all (with a little bad luck).

more

BUSINESS

Google announces ad blocker - and shakes the foundation of the ad industry

Sven Krumrey

Ad blockers as superweapons

Recently, the ad industry was rattled at its core as Google announced they would be adding an ad blocker to Chrome in 2018 that will rigorously block invasive (obtrusive) ads. Why would a company like Google that makes millions off ads take such a step? All over the world, ad creators are frantically calling their lawyers while comment sections are overflowing with doom and gloom. Is Google taking the side of annoyed Internet users or are they simply using their market power to kill off rivals? Maybe both.

more

TECH

Joy, pain and unknown manatees: a Microsoft Video Indexer test

Sven Krumrey

A bright outlook into the future at Build 2017

Recently, Microsoft's Build 2017, an annual developer conference, took place in Seattle and the company once again displayed their crown jewels along with big plans for the future (as always). With a Colgate smile, attendees were shown what smart services can do with cloud data - and data protection officials were probably reaching for their suicide pills right away. Video Indexer is a great example of how to leverage these new technologies and you can give it a try - if you dare. After all, Microsoft didn't lie when they spoke of a "democratization of surveillance tools".

more

TECH

Secure logins: two-factor authentication

Sven Krumrey

Two factors for more sign-in security

We all want data security - and sometimes you need to change your habits for it. I already wrote about strong passwords and how to detect phishing attempts so today's article is about secure logins. Two-factor authentication may sound like a bureaucrat's wet drean but it does wonders for the security of your user accounts, even when your login credentials have already been stolen!

more

TECH

When a secret weapon falls into the wrong hands

Sven Krumrey

The spy on your PC - or is it the villain?

Sunday afternoon movies can be so wonderfully relaxing. Stations frequently show old spy movies with super villains stealing super secret weapons from government facilities. Armed with laser cannons and other gadgetry, they go on a raid until they're stopped by the hero at the last minute. With the world on the verge of unspeakable catastrophes, we hear the cuffs click and see secret societies of villains get uncovered and eradicated. This blog article tells a similar story except that, in this case, heroes are scarce, villains still out and about and the secret weapon is targeted at your PC.

more