Zoom decided to implement End to End encryption (ultimately) to solve the security problem of this application - one of the most popular teleconferencing applications.
We are convinced that this is a step in the right direction, but is it such an amazing…
In order to use the Internet in China without any obstacles, users must agree to verify their appearance using a face recognition system. Citizens who refuse will be blacklisted, and the government will take a closer look at their actions.
pexels.com
The Social…
Aby móc „swobodnie” surfować po sieci w Państwie Środka, trzeba zgodzić się na identyfikację twarzy. Ci, którzy się temu nie poddadzą, trafią na czarną listę, a rząd uważniej przyjrzy się ich aktywnościom.
pexels.com
System Zaufania Społecznego lub System Wiarygodności Społecznej po raz pierwszy…
Spyware installed on the subordinates' work phones is one of the most well-known tracking techniques. Do you know how to detect such software or how to protect yourself from it? In this article, we present everything that each employee should know about…
Jednym z najbardziej „popularnych” sposobów śledzenia pracowników jest oprogramowanie szpiegowskie instalowane na telefonach służbowych pracowników. Wiesz, jak je wykryć? Jak się przed nimi ochronić? W tym tekście znajdziesz wszystko, co powinieneś wiedzieć na ten temat.
Fezbot2000/ Unsplash
Dzięki aplikacjom szpiegowskim pracodawcy mogą obserwować…
Free and popular communicators that encrypt the data are only seemingly secure, they do not provide sufficient protection of transferred data. It is reckless to use them if you have a responsible job.
Adeolu Eletu/ Unsplash
Do you remember the famous scandal involving…
Samsung created technology based on artificial intelligence (AI) that can revive a character based on one photo. The outcome can amuse because talking Mona Lisa or Albert Einstein is quite an entertainment.
Egor Zagharov/ Youtube
The described method is called "deepfake". The term…
Your boss knows everything you do, like how many e-mails you sent, the content of messages, visited websites or with who were you talking on the phone/messengers. Even if you kept something secret, it could leak out when you return your work…
Before returning work phones, workers usually erase photos, messages content and saved documents. Does that mean they do not have anything to fear? We have bad news. Unfortunately, the employer's eagle eye can detect you even when you are out of sight.
Matthias…
Adding "from Facebook" to the names of Instagram and WhatsApp is just the beginning of the upcoming innovations. Zuckerberg's company aims to merge all of its three main apps so that the access to private users' data will become easy.
Pete Pedroza/…