We are so good at writing catchy headlines. Wasting time. Bypass system security, install a trojan and claim hacked. tomsguide.com/us/mac-os-keyc…
A very power #Qi charger. I wonder what you can do with right hacked receiver coil near it. theverge.com/2017/9/25/1636…
A very power #Qi charger. I wonder what you can do with right hacked receiver coil near it. theverge.com/2017/9/25/1636…
Can it link up to global database of known intruders in future? Will that include annoying parents? :) #Security independent.co.uk/life-style/gad…
Can it link up to global database of known intruders in future? Will that include annoying parents? 🙂 #Security independent.co.uk/life-style/gad…
#RaspberryPi to solve future #autonomouscars problems. Or just fun to race around at home to annoy parents. hackaday.com/2017/09/16/tab…
#RaspberryPi to solve future #autonomouscars problems. Or just fun to race around at home to annoy parents. hackaday.com/2017/09/16/tab…
Do we even remember #Google Face Unlock in #Android 4.0 Ice Cream Sandwich? Which can be bypassed with a photo? bgr.com/2017/09/15/iph…
Do we even remember #Google Face Unlock in #Android 4.0 Ice Cream Sandwich? Which can be bypassed with a photo? bgr.com/2017/09/15/iph…
Okay, I am just too lazy, still prefer to wait for #RaspberryPi 4. But good to know what others can do with #RPi3. hackaday.com/2017/09/13/the…
Okay, I am just too lazy, still prefer to wait for #RaspberryPi 4. But good to know what others can do with #RPi3. hackaday.com/2017/09/13/the…
Someone will try to hack #FaceID like they did with fake fingerprints with #TouchID. bbc.co.uk/news/av/techno…
Someone will try to hack #FaceID like they did with fake fingerprints with #TouchID. bbc.co.uk/news/av/techno…
#AI can be scary in the hands of hackers. We need to listen to #Elon. gizmodo.com.au/2017/09/hacker…
#AI can be scary in the hands of hackers. We need to listen to #Elon. gizmodo.com.au/2017/09/hacker…
#BlueBorne is a new set of #Bluetooth exploits for unauthorized access to computers, phones, #IoT devices. #Security techcrunch.com/2017/09/12/new…
#BlueBorne is a new set of #Bluetooth exploits for unauthorized access to computers, phones, #IoT devices. #Security techcrunch.com/2017/09/12/new…