TECH

"One iPhone hack, please." "Gladly, that'll be two million dollars."

Sven Krumrey

Inglorious holes

Security holes are a much sought-after commodity especially those still unknown to the security community. As there is no defense against these attacks, they're fittingly called zero-day exploits with zero being the number of days software developers have to provide a fix. They are the perfect attack vector to distribute malware, steal data or sabotage computer systems - and there's a global market for them!

more

TECH

The certificate war

Sven Krumrey

The bone of content

Google is peeved. And every time Google is enraged, Chrome, the market leader among browsers, is readied for battle. This time, it's about certificates, a cornerstone of the Internet and data security. With the upcoming versions 66 (scheduled for April) and 70 (October), Google seeks to make the web more secure - and tries to settle a few scores in the process. Read on to learn why many sites will soon be flagged as "insecure" and disappear from the top search results!

more

TECH

Your voice is unmistakable? Not for long!

Sven Krumrey

When machines do the calling

There's something magical about voices. We grow up with the voices of our parents, recognize our friends by theirs and enjoy listening to memorable lines delivered by talented actors and speakers. So far, computer voices sounded anything but natural whether in the shape of assistants like Cortana or navigation systems. They always sounded alien, robotic and artificial. The Lyrebird software aims to change all that. What was once unmistakable is said to soon become perfectly imitable.

more

TECH

Android always up-to-date - Android One

Sven Krumrey

There are many versions of Android

Until now, the update policy of many Android cellphone manufacturers resembled the nursing behavior of a cuckoo: they took to their heels. This annoyance has been tolerated by buyers for several years, maybe many didn't even realize the importance of regular updates. Only owning a Google-backed device like Nexus or Pixel meant you were on the safe side. Super cheap phones were sometimes even cut off from updates the moment they were sold. This grieved not only users but also Google - and it may finally be about to change with Android One!

more

TECH

Hackers - the great unknown

Sven Krumrey

Anonymous stars of the hacker community

Seldom does the media paint a more distorted picture than when it comes to hacking. It goes something like this: a man wearing a balaclava sits in a dark room typing away at his computer. Green cryptic characters fill up his screen until he reaches his murky goal! So far, so unrealistic. That there's more to the hacker community that once featured prominent members like Apple founders Steve Wozniak and Steve Jobs and that many security issues became public thanks to hacking is a story that is rarely told. And the many positively motivated members are also swept under the rug all too frequently. Reason enough to take a closer look at hackers.

more