T-Mobile dataJAR

Deutsche Telekom calls on the British company to stop using the...

Which company do you associate with the magenta colour? There is nothing to cheat. A lot of people will show here the mobile operator...
Tesla S 60

The man turned on the Tesla autopilot mode and sat on...

I am a fan of new technologies myself, but I am not fascinated enough to entrust them with my life. Apparently a completely different...
PowerHammer

Criminals can steal data through… an electrical network

The classic methods of attacks against information systems assume that the attacked machine is connected to any network, usually the Internet. That is why...
Ford LTE

Ford will have LTE in all its cars by 2020

Soon everything will be smart. We already have smartphones, smartphones, smartwatches, smart TV, etc. Smart-cars, that is vehicles equipped with an antenna and a...
cryptocurrencies

Russian scientists arrested for extracting cryptocurrencies

Cryptocurrencies have already reached the so-called mainstream. This means that almost everyone has heard of BitCoin and other virtual currencies. This information also reached...
BitCoin Steam

Steam has abandoned BitCoin as a payment method for games

This is not good news for cryptocurrency supporters. Steam is one of the largest game distribution platforms which can inspire other systems based on...
Once Alike robot barista

An Australian coffee shop is testing a barista robot

The purpose of automation is to replace a human being in repetitive and monotonous activities. Is making coffee for them? We have already got...
PornHub malware

Malware has spread through ads on PornHub

Popular web sites can not afford to place malicious software on their sites. However, they have to maintain something, so they place ads. That...
screen

Attack on smartphones using the replacement screen from an unknown vendor

Some have already become accustomed to the fact that cybercriminals place malicious code in various applications. Today, viruses are everywhere, even in official app...