The owners of certain expensive cars can analyze their driving skills in the same way F1 pilots do. However, this information is sensitive and, thus, should be protected.
Almost three dozen computers are required by Ferrari engineers to analyze everything happening with a racecar and decide on the maintenance. However, there are other computers in ...
What changed in Sochi since Olympic games? Does infrastructure suit Grand Prix? Let's find out together.
We have bought our very own Blackphone to check its security firsthand.
Data breaches have become a routine. It can happen to any site, any day. You can’t prevent it, but there is a way to minimize the damage.
Your iPhone runs hidden monitoring services. Who uses them, and for what purpose?
A new version of file-encrypting malware hides its sever inside an anonymous TOR network, making it safer for criminals to extort money from victims.
Criminals invented Cryptolocker, spying malware and Zeus banking Trojan. We have new protection against them.
New analysis pinpoints some weaknesses in a new generation of cars with online capabilities. If exploited, this may result in car theft and other problems.
Let’s analyze new safety features in the upcoming Android release while we wait for it to arrive.