95% of Android phones can be hacked with one just MMS, millions at risk
The most scandalous threat is tickling the nerves of Android phones owners: Zimperium zLabs reported six gaping hole in Google OS in April 2015. They also told Forbes that while
1127 articles
The most scandalous threat is tickling the nerves of Android phones owners: Zimperium zLabs reported six gaping hole in Google OS in April 2015. They also told Forbes that while
In the beginning of 2015, USA Today launched a wave of publications on a handheld radar called RANGE-R that has been used by the U.S. police and other government services. The radar system is
Kaspersky Lab solutions are regularly qualified as the best by a great number of independent security tests. Recently, MRG Effitas awarded Kaspersky Lab’s technology for online banking protection with its
Connected devices give us access to an unlimited source of information — the Internet. They also serve as a reserve data storage for unmindful owners. Basically, the majority of smartphone
Vitaly Kamluk has more than 10 years of work experience in IT security, and now he is Principal Security Researcher at Kaspersky Lab. He specializes in malware reverse engineering, computer
Vitaly Kamluk has more than 10 years of experience in IT security and now he holds the title Principal Security Researcher at Kaspersky Lab. He specializes in malware reverse engineering, computer
Why would cyber-criminals want to control your Facebook account? At the very least, they could “like” weird things and promote questionable goods and services on your behalf. However, Facebook is
At the recent Google I/O conference, the ‘corporation of good’ announced (in addition to new Android versions, new services, and other predictable announcements), four new projects: Soli, Jacquard, Vault, and Abacus.
From the moment of the biochip injection I was repeatedly asked the same, almost Shakespearean, questions: “Once I decide to become a cyborg, how will my current routine change? What’s the point
An online password manager can make your life much easier by automatically entering individual passwords for each website and service you visit. It is a very convenient tool – unless
Unwanted email has long stopped being just a source of advertising services or products. The time it takes to erase all spam messages from your inbox is not the only
Every time you speak about how the great revolution in the principles of data transmission and the information security principles was sparked by the Internet, make sure to remember one
I’ve got some bad news and some good news. The bad news The bad news is that we discovered an advanced attack on our own internal networks. It was complex,
Just ten days after the remarkable Google I/O event, Apple is holding its own developers conference in the same place, Moscone Center, in San Francisco, CA. Traditionally, WWDC is focused on
Local governments and law enforcement are becoming increasingly more reliant on networked surveillance cameras in order to monitor densely populated urban areas. London is a notorious example of urban surveillance,
Recently, Apple’s CEO Tim Cook delivered a speech on privacy and security during EPIC’s Champions of Freedom event held in Washington, DC. We want to share with you the 10 best quotes
Recently Kaspersky Lab experts have found a sly method that allows fraudsters to steal personal information without access to the user’s login and password. The cyber criminals do not try
Despite the fact that Google I/O is a developers conference, it always gets the attention of journalists and consumers as well. The reason is simple: this is when Google shows
Virtual reality experiments have been continuously carried out since user PCs learned to process graphics. Step by step, the tech has become capable of creating virtual worlds that look relatively
While LTE networks are seemingly just now starting to take off and are not yet omnipresent, networking vendors and carriers are already fully engaged in a vivid discussion on 5G’s
Merchant vessels are continuously becoming bigger and getting more electronic systems. Seafarers often depend on technology data more than their own skills, knowledge, and senses. Crews are becoming smaller as computer