Google I/O 2015: 7 things you should know about next-gen Android M
Despite the fact that Google I/O is a developers conference, it always gets the attention of journalists and consumers as well. The reason is simple: this is when Google shows
Despite the fact that Google I/O is a developers conference, it always gets the attention of journalists and consumers as well. The reason is simple: this is when Google shows
Virtual reality experiments have been continuously carried out since user PCs learned to process graphics. Step by step, the tech has become capable of creating virtual worlds that look relatively
While LTE networks are seemingly just now starting to take off and are not yet omnipresent, networking vendors and carriers are already fully engaged in a vivid discussion on 5G’s
Merchant vessels are continuously becoming bigger and getting more electronic systems. Seafarers often depend on technology data more than their own skills, knowledge, and senses. Crews are becoming smaller as computer
Ransomware is a kind of malware that steals users’ files and exacts a ransom from its victims. The most effective approach is to encrypt the files and offer decryption keys
Much has been said about the VENOM vulnerability, the latest in an increasingly long line of bugs affecting vast swaths of the Internet. It’s an old-school bug of the relatively new-age
The Chinese-language Naikon advanced persistent threat group is targeting military, government and civil organizations located in and around the South China Sea, which is an increasingly contentious hot-bed of territorial disputes between
When you look at airplanes moving on a map, using some tracking service like Flightradar24, you get the feeling it’s sheer Brownian motion. It may look like an abundance of aircrafts moving
Today we will relate a Kaspersky Lab implantation experiment to a comprehensible, and culturally relevant concept – the use of Jedi Force™. This might surprise you, but with the current
Updated: Current principles for the processing of user data by Kaspersky Lab security solutions and technologies can be found here. While the cloud-based security approach is not a novelty, it’s
Yesterday my favorite part of Kaspersky Lab — which is certainly the lab itself – grew, as we have opened our first European Research Center. It will be home to
In yet another example of smart medical device insecurity, it has emerged recently that a line of Hospira drug pumps are exposed to a series of remotely exploitable vulnerabilities that could
It’s curious how the tone of the discussion has been changing since the topic of driverless cars first received traction in the media. This time last year, the majority of debates centered around
We’ve created an infographic that shows how the Kaspersky Lab flagship antivirus software has improved over the last several years.