Keep calm and search Facebook with Google
Over the past few weeks, we’ve discussed a few areas where you should brush up on your personal privacy settings for both Facebook and Google. Chances are you read it and said, “man
593 articles
Over the past few weeks, we’ve discussed a few areas where you should brush up on your personal privacy settings for both Facebook and Google. Chances are you read it and said, “man
What is the best channel to exchange private information on? Or even better, what channels should you avoid using for this type of sharing? It goes without saying that it’s
As proven by Ed Snowden and Co., utopias are a myth. The anti-utopian storylines have been ingrained in our everyday lives. Technological progress brings a lot of magnificent things like crime
When I was growing up, my parents would often embarrass me in front of future ex-girlfriends as well as my friends by pulling out photo albums compiled of photos from
Remember last year’s well-publicized leak, which exposed some celebrities’ nude photos? The story not only made some individuals’ day (and probably night), it turned to be a very educating precedent. For
Abuse of big data means your worst paranoia scenarios come true, including, among other things, the endless government surveillance, insurance agencies despotism and employers tyranny. Like it or not, the
Merely 23 years ago Microsoft released Windows 3.1 operating system, Apple showed its first iPhone PDA, and Linus Torvalds released Linux under GNU license. Eugene Kaspersky published the book with
Why would cyber-criminals want to control your Facebook account? At the very least, they could “like” weird things and promote questionable goods and services on your behalf. However, Facebook is
Just ten days after the remarkable Google I/O event, Apple is holding its own developers conference in the same place, Moscone Center, in San Francisco, CA. Traditionally, WWDC is focused on
Local governments and law enforcement are becoming increasingly more reliant on networked surveillance cameras in order to monitor densely populated urban areas. London is a notorious example of urban surveillance,
Despite the fact that Google I/O is a developers conference, it always gets the attention of journalists and consumers as well. The reason is simple: this is when Google shows
Yesterday my favorite part of Kaspersky Lab — which is certainly the lab itself – grew, as we have opened our first European Research Center. It will be home to
The word “IoT” (Internet of Things) has been a buzz word for several years now. It has become the era when more home electronics and cars are connected to the
Photographer Curtis Wallen’s latest exhibit, “Proposition For An On Demand Clandestine Communication Network,” opened in a Brooklyn art-house Sunday. The work explored what it would take for a normal person to
The latest privacy-related kerfuffle, involving Lenovo, who thought it was a great idea to pre-install some very nasty adware with gaping security holes, was like a blast from the past. Once
Do you know what your child is doing when s/he holding smartphone or tablet in his/her hands? Maybe everything is fine and s/he is just watching movies or playing game.
The latest in a long line of whistleblower Edward Snowden’s National Security Agency revelations may be among the most shocking: that the NSA and its British counterpart, GCHQ, allegedly compromised
I woke up to find a Band-Aid on my hand. It was covering a small wound between the thumb and the index finger. That was when I had a WTF moment.
It turned out that Lenovo’s laptops had been shipped with an adware called Superfish. It possibly allows eavesdropping on encrypted connections.
Buried in Samsung’s terms of service is the admission that spoken words are picked up and passed along to third parties by voice recognition.
WhatsApp has finally released a Web version of its popular mobile messaging service. We take a look at it from the security perspective.