Internet of things and cybersecurity of infrastructure
The word “IoT” (Internet of Things) has been a buzz word for several years now. It has become the era when more home electronics and cars are connected to the
2909 articles
The word “IoT” (Internet of Things) has been a buzz word for several years now. It has become the era when more home electronics and cars are connected to the
Threats are everywhere on the Internet and they pose a serious danger to younger users. Moreover, use of mobile devices leave children even more vulnerable because they are free to surf
Photographer Curtis Wallen’s latest exhibit, “Proposition For An On Demand Clandestine Communication Network,” opened in a Brooklyn art-house Sunday. The work explored what it would take for a normal person to
There are many cool and funny projects in the world that deal with big data and we’ve gathered the Top 10 list of the most interesting ones. See for yourself!
The most devastating disappointment I have ever experienced since I started the biochip experiment is Apple’s position towards NFC. Or, to be more straightforward, the company’s desire to usurp the
An airborne plane is one of the safest places on the planet. However, there are rules to abide by in order to make sure the flight is a comfortable and
During my first two weeks of the biochip experience I had time to mull over a lot of things. The deluge of questions from the community pushed this process further: it’s one
Though the number of high-profile announcements decreases with each passing year, one can still find lots of innovative gadgets at Mobile World Congress. We spent a few days at the
The latest privacy-related kerfuffle, involving Lenovo, who thought it was a great idea to pre-install some very nasty adware with gaping security holes, was like a blast from the past. Once
Do you know what your child is doing when s/he holding smartphone or tablet in his/her hands? Maybe everything is fine and s/he is just watching movies or playing game.
Last year one idea attracted a great deal of attention: PC games may be used to develop intellectual — or, more precisely, cognitive — abilities. The idea is probably as
The latest in a long line of whistleblower Edward Snowden’s National Security Agency revelations may be among the most shocking: that the NSA and its British counterpart, GCHQ, allegedly compromised
For a regular user like you and me it’s hard to imagine the whole path of online payment transactions and all obstacles that can appear on the way of one
I woke up to find a Band-Aid on my hand. It was covering a small wound between the thumb and the index finger. That was when I had a WTF moment.
Threatpost reporters Chris Brook and Brian Donohue revisit last week’s Security Analyst Summit, an event put on by Kaspersky Lab in Cancun, Mexico. Talks of interest include the Kaspersky Lab
It turned out that Lenovo’s laptops had been shipped with an adware called Superfish. It possibly allows eavesdropping on encrypted connections.
Do you like working in open plan office? Many say no. That can be remedied by new ideas introduced by office space designers.
Kaspersky Lab researchers uncovered Desert Falcons, the first exclusively Arabic APT group, presenting their findings at the Security Analyst Summit in Cancun.
There is a flood of appliances which could be connected – and some are connected – without a second thought as to whether or not it’s necessary or secure.
The geopolitical conflicts in the Middle East have deepened over the last few years. The crisis is taking many forms, and the conflict in cyberspace is intensifying as different sides
Let’s talk about the dangers of cross-border payments with plastic cards and security flaws in payment systems architecture.