What your business needs to know about GDPR
The amount of personal data leaked by companies that store or process it has been growing at an alarming rate over the past few years. Yahoo’s record-breaking 2016 data breach
76 articles
The amount of personal data leaked by companies that store or process it has been growing at an alarming rate over the past few years. Yahoo’s record-breaking 2016 data breach
1. Make backups on a regular basis. 2. Make backups on a regular basis. 3. Make backups on a regular basis. 4. Make backups on a regular basis. 5. Make
Nowadays the proverb “the walls have ears” is not as metaphoric as it used to be. “The telescreen received and transmitted simultaneously. Any sound that Winston made, above the level
You’ve probably heard the word botnet more than once recently, and that’s hardly surprising. Any connected device can be zombified — turned into a part of a botnet. These include PCs, smartphones,
Our bionic man, Evgeny Chereshnev, had a chance to speak at a TedX event in Kazan. During his 17-minute talk, he discussed what he has learned from having a biochip
For centuries, advertising was fundamentally unidirectional. A company blasted out advertising and the public — actually, not a very predictable portion of the public — received it. That’s still the
Last week Facebook posted a video of its solar-powered Aquila drone’s inaugural flight. The aircraft’s design is of flying wing type, with a wingspan close to that of Boeing 737, covered with solar panels.
You scroll through profiles on a dating site and you see a nice girl who you might like to date. You can send her a message — and she’ll answer
Doctors and patients across the world, beware: cyberciminals have a new member of the family! Despite its young age, a one-month-old ransomware has already encrypted files in two American hospitals
Today a smartphone has become an integral part of our life. We constantly use phones for work, study, travel, and they are increasingly starting to know more about us than we
Ransomware has become one of the most notorious cyberthreats. Once a ransomware Trojan infiltrates your system, it stealthily encrypts your files, including your valuable documents, videos and photos. This entire
If you sit and think about it for a second, online phishing is not that far from actual fishing. The one major difference is that the online fishermen are criminals.
As proven by Ed Snowden and Co., utopias are a myth. The anti-utopian storylines have been ingrained in our everyday lives. Technological progress brings a lot of magnificent things like crime
Abuse of big data means your worst paranoia scenarios come true, including, among other things, the endless government surveillance, insurance agencies despotism and employers tyranny. Like it or not, the
Connected devices give us access to an unlimited source of information — the Internet. They also serve as a reserve data storage for unmindful owners. Basically, the majority of smartphone
Vitaly Kamluk has more than 10 years of experience in IT security and now he holds the title Principal Security Researcher at Kaspersky Lab. He specializes in malware reverse engineering, computer
An online password manager can make your life much easier by automatically entering individual passwords for each website and service you visit. It is a very convenient tool – unless
While LTE networks are seemingly just now starting to take off and are not yet omnipresent, networking vendors and carriers are already fully engaged in a vivid discussion on 5G’s
There are many cool and funny projects in the world that deal with big data and we’ve gathered the Top 10 list of the most interesting ones. See for yourself!
It turned out that Lenovo’s laptops had been shipped with an adware called Superfish. It possibly allows eavesdropping on encrypted connections.
A new poll shows Americans care overwhelmingly about digital privacy.