TECH

The certificate war

Sven Krumrey

The bone of content

Google is peeved. And every time Google is enraged, Chrome, the market leader among browsers, is readied for battle. This time, it's about certificates, a cornerstone of the Internet and data security. With the upcoming versions 66 (scheduled for April) and 70 (October), Google seeks to make the web more secure - and tries to settle a few scores in the process. Read on to learn why many sites will soon be flagged as "insecure" and disappear from the top search results!

more

TECH

Your voice is unmistakable? Not for long!

Sven Krumrey

When machines do the calling

There's something magical about voices. We grow up with the voices of our parents, recognize our friends by theirs and enjoy listening to memorable lines delivered by talented actors and speakers. So far, computer voices sounded anything but natural whether in the shape of assistants like Cortana or navigation systems. They always sounded alien, robotic and artificial. The Lyrebird software aims to change all that. What was once unmistakable is said to soon become perfectly imitable.

more

TECH

Android always up-to-date - Android One

Sven Krumrey

There are many versions of Android

Until now, the update policy of many Android cellphone manufacturers resembled the nursing behavior of a cuckoo: they took to their heels. This annoyance has been tolerated by buyers for several years, maybe many didn't even realize the importance of regular updates. Only owning a Google-backed device like Nexus or Pixel meant you were on the safe side. Super cheap phones were sometimes even cut off from updates the moment they were sold. This grieved not only users but also Google - and it may finally be about to change with Android One!

more

TECH

Hackers - the great unknown

Sven Krumrey

Anonymous stars of the hacker community

Seldom does the media paint a more distorted picture than when it comes to hacking. It goes something like this: a man wearing a balaclava sits in a dark room typing away at his computer. Green cryptic characters fill up his screen until he reaches his murky goal! So far, so unrealistic. That there's more to the hacker community that once featured prominent members like Apple founders Steve Wozniak and Steve Jobs and that many security issues became public thanks to hacking is a story that is rarely told. And the many positively motivated members are also swept under the rug all too frequently. Reason enough to take a closer look at hackers.

more

TECH

Meltdown and Spectre: the great processor disaster

Sven Krumrey

Suddenly the center of attention: processors and how they work

As a computer scientist, I deal with security vulnerabilities on a daily basis since the perfect operating system has just not been found yet - but this time I almost spilled my tea when I read the news. This issue was different and it affected the core of all computer calculations: the processor itself. And it wasn't just any processor that was vulnerable but practically all of them whether they were built into PCs, cellphones or servers all over the world. This time, the remedy wasn't a simple browser patch. Every operating system had become unsafe taking the wind right out of the sails of Apple users who like to point their fingers at the supposedly inferior security of Windows systems. They were all in danger. Even those who owned none of the CPUs listed couldn't just sit back and relax because the servers that host and process all of our data could also be affected. Read on to learn what happened and how manufacturers are dealing with the dire situation.

more