Author: admin


What is biometric data?

Mar 22, 2019 biometric by admin
Each person has unique physical characteristics. Some of them are derived from birth — DNA, fingerprints, hand geometry, vein pattern, iris. Others are acquired over time and may change throughout the life of gait, tone of voice, signature. All these characteristics are not repeated in any of the inhabitants of our planet, which means that they can identify an individual.
Read More
top 3 technology

TOP 3 technologies of the future

Feb 9, 2019 a space by admin
Journalists from MIT Technology Review published an annual list of technologies that, in their opinion, will rapidly develop in the coming years. Some of them already exist, and others are just being developed, but we will monitor them now. As predicted in the last report, in 2018, many companies engaged in the development and testing of unmanned trucks: Uber, Waymo, Daimler. A truck company Embark set a record by driving the United States from coast to coast. Gene therapy, which journalists called one of the most promising technologies of 2018, has already gradually become embedded in medicine. The us Department of health has approved three gene drugs: two of them fight cancer, and the third — with blindness.
Read More
Volkswagen accidentally showed the future electric car at the price of Golf

How to come up with a strong password and do not forget it?

A strong password is one of the first indicators that can protect your personal data that is stored on your PC or in the Internet. Come up with a strong password is not very difficult, the main thing is not to forget it. The team of TMGinfo faced a problem how to come up with a strong password, and decided to share with You their experience. In this article we will give answers why it is better not to put some passwords at all, and how to choose a password that can protect your personal data.
Read More

How attackers over 4G can ruin your life: 10 new ways from scientists

Researchers at Purdue University and the University of Iowa have come up with 10 new ways to hack 4G LTE networks. With them, hackers can connect to the network under the guise of another user, spoof the sender of messages and data on the location of the mobile device, as well as forcibly disconnect other people's phones from the network. We tell briefly about what the researchers came up with.
Read More