Security holes are a much sought-after commodity especially those still unknown to the security community. As there is no defense against these attacks, they're fittingly called zero-day exploits with zero being the number of days software developers have to provide a fix. They are the perfect attack vector to distribute malware, steal data or sabotage computer systems - and there's a global market for them!
Google is peeved. And every time Google is enraged, Chrome, the market leader among browsers, is readied for battle. This time, it's about certificates, a cornerstone of the Internet and data security. With the upcoming versions 66 (scheduled for April) and 70 (October), Google seeks to make the web more secure - and tries to settle a few scores in the process. Read on to learn why many sites will soon be flagged as "insecure" and disappear from the top search results!
There's something magical about voices. We grow up with the voices of our parents, recognize our friends by theirs and enjoy listening to memorable lines delivered by talented actors and speakers. So far, computer voices sounded anything but natural whether in the shape of assistants like Cortana or navigation systems. They always sounded alien, robotic and artificial. The Lyrebird software aims to change all that. What was once unmistakable is said to soon become perfectly imitable.
Until now, the update policy of many Android cellphone manufacturers resembled the nursing behavior of a cuckoo: they took to their heels. This annoyance has been tolerated by buyers for several years, maybe many didn't even realize the importance of regular updates. Only owning a Google-backed device like Nexus or Pixel meant you were on the safe side. Super cheap phones were sometimes even cut off from updates the moment they were sold. This grieved not only users but also Google - and it may finally be about to change with Android One!
Seldom does the media paint a more distorted picture than when it comes to hacking. It goes something like this: a man wearing a balaclava sits in a dark room typing away at his computer. Green cryptic characters fill up his screen until he reaches his murky goal! So far, so unrealistic. That there's more to the hacker community that once featured prominent members like Apple founders Steve Wozniak and Steve Jobs and that many security issues became public thanks to hacking is a story that is rarely told. And the many positively motivated members are also swept under the rug all too frequently. Reason enough to take a closer look at hackers.