WannaCry: On screens everywhere!
The outbreak of Trojan ransomware WannaCry has already caused a heap of trouble to all kinds of businesses. However, we expect that companies whose infrastructures employ embedded systems are feeling
2759 articles
The outbreak of Trojan ransomware WannaCry has already caused a heap of trouble to all kinds of businesses. However, we expect that companies whose infrastructures employ embedded systems are feeling
The unprecedented outbreak of Trojan ransomware WannaCry has created a worldwide plague affecting home users and businesses. We have already posted some basics about WannaCry, and in this post we
A few days ago, an outbreak of the Trojan encryptor WannaCry started. It appears that the epidemic is global. We call it an epidemic since the extent of it is
Targeted ads are all over the Internet nowadays. One minute you’re searching for information about hair loss, the next you’re seeing offers for a remedy. Click the Like button on
The amount of personal data leaked by companies that store or process it has been growing at an alarming rate over the past few years. Yahoo’s record-breaking 2016 data breach
1. Make backups on a regular basis. 2. Make backups on a regular basis. 3. Make backups on a regular basis. 4. Make backups on a regular basis. 5. Make
It’s the small things in life — delicious tea in your favorite mug, comfortable shoes, a flower on the window seat, and … the Kaspersky Protection browser extension. We’ve already discussed its
About a year ago, a number of people, truly passionate enthusiasts and straight-up frauds alike, started manically preaching the coming of the Blockchain Almighty. It will change the world forever,
We’ve written about insecure fingerprint sensors and other biometric technologies a lot. We were not alone, of course. It looks like the fuss did some good. At Mobile World Congress (MWC) 2017 in Barcelona, many
Who among us has never tried to imagine what future lies ahead? The average citizen might think a month or a year ahead, but futurologists try to forecast the destiny
Nowadays the proverb “the walls have ears” is not as metaphoric as it used to be. “The telescreen received and transmitted simultaneously. Any sound that Winston made, above the level
Recent news about IP cameras being hacked and private footage sold unlawfully online has bestirred the Internet yet again. Such headlines are now unsurprising; however, one new case has a sensitive twist:
Last week, a coworker shared an interesting article with me from the BBC. It reported that Germans were being told to destroy a connected children’s toy because of hacking concerns.
And now, boys and girls, woo-hoo! Today is a day when woo-hoo’ing seems the most appropriate thing to do. Like this: WOO-HOO!!! Why, you say? We’ve officially launched our very
In the movie Dude, Where’s My Car? (2000), viewers follow the humorous tale of two guys who partied a bit too hard trying to remember where they parked their car. We’ve all
We keep talking (and talking, and talking) about passwords. Having strong passwords for all accounts is really a must: Our recent study shows that one in five users has experienced attempts to hack their accounts —
The annual RSA conference will often overwhelm the average attendee. Between the great talks, the exhibition hall, the parties, and the city of San Francisco itself, there is a whole
Before the advent of Internet dating, we used to head to various places to socialize and meet people — bars, pubs, clubs, parties, weddings, places of worship, and even the
Updated October 9, 2018: Google has changed app permission settings in Android Oreo, adding a new group called “Special app access.” More details are available in “App permissions in Android
One day in May 2016, Marion, a computer user from Germany, logged on to her home computer. She had no idea what lay in store for her. The first sign