
Google I/O 2015: 7 things you should know about next-gen Android M
Despite the fact that Google I/O is a developers conference, it always gets the attention of journalists and consumers as well. The reason is simple: this is when Google shows
444 articles
Despite the fact that Google I/O is a developers conference, it always gets the attention of journalists and consumers as well. The reason is simple: this is when Google shows
Merchant vessels are continuously becoming bigger and getting more electronic systems. Seafarers often depend on technology data more than their own skills, knowledge, and senses. Crews are becoming smaller as computer
Much has been said about the VENOM vulnerability, the latest in an increasingly long line of bugs affecting vast swaths of the Internet. It’s an old-school bug of the relatively new-age
Yesterday my favorite part of Kaspersky Lab — which is certainly the lab itself – grew, as we have opened our first European Research Center. It will be home to
In yet another example of smart medical device insecurity, it has emerged recently that a line of Hospira drug pumps are exposed to a series of remotely exploitable vulnerabilities that could
Yet another APT of the ‘Dukes family’ is hitting high-profile targets, including the US government office. This time it’s CozyDuke, also known as CozyBear, CozyCar or “Office Monkeys” in honor of
Recently the United States Government Accountability Office published a report warning the Federal Aviation Administration that aviation faces cybersecurity challenges in “at least three areas”, including the protection of aircraft avionics used to operate and guide aircrafts.
World nations are building fleets of unmanned robotic boats to perform missions above, on and under the water. Though there are only a few hundred unmanned maritime vessels in operation worldwide, drones
Many people still think that malware is a software that completely disrupts normal functioning of PCs. If your computer is working tip-top, it means it‘s not infected, right? Wrong. Malware creators are
In theory, it’s common knowledge that “there’s no such thing as a free lunch”, but when it comes to practice, some forget about the ‘free lunch’ proverb and prefer another
During my first two weeks of the biochip experience I had time to mull over a lot of things. The deluge of questions from the community pushed this process further: it’s one
The latest in a long line of whistleblower Edward Snowden’s National Security Agency revelations may be among the most shocking: that the NSA and its British counterpart, GCHQ, allegedly compromised
Threatpost reporters Chris Brook and Brian Donohue revisit last week’s Security Analyst Summit, an event put on by Kaspersky Lab in Cancun, Mexico. Talks of interest include the Kaspersky Lab
It turned out that Lenovo’s laptops had been shipped with an adware called Superfish. It possibly allows eavesdropping on encrypted connections.
The Carbanak APT group managed to steal a total of $1 bln from dozens of banks worldwide
Buried in Samsung’s terms of service is the admission that spoken words are picked up and passed along to third parties by voice recognition.
In this talk security podcast, Chris Brook and Brian Donohue discuss the upcoming Security Analyst Summit, Flash zero days, the Ghost vulnerability and the Anthem breach
WhatsApp has finally released a Web version of its popular mobile messaging service. We take a look at it from the security perspective.
The Internet continues to find its way into the private lives of its users. Here, we brief you on the most common methods of online tracking.
Have you ever wondered how a typical office would look in a decade or so? Allow us to take you on a small tour of the most interesting office concepts.
The top privacy data leaks in 2014 include: data breaches at Target and Home Depot, hacks of JP Morgan and Barclays banks, and leaks at Orange and Dropbox.
ACCEPT AND CLOSE
Notifications