How eSIM works
New iPhones support eSIM technology. We explain what it is and who will soon be using it.
87 articles
New iPhones support eSIM technology. We explain what it is and who will soon be using it.
A look at how payment information is protected on smartphones that support contactless payments.
The European Commission’s proposed ePrivacy Regulation takes effect in May 2018. Why is it a battle — and who is fighting for what?
Almost every new smartphone now lets you unlock it with your face — and that’s really bad for security.
Solar power and wind energy could one day replace oil and gas.
The infrastructure for electric cars is developing, and the number of cars grows rapidly. But do providers even care about security?
Along with economic benefits, any new technology also comes with a certain number of problems. Cryptocurrencies are no exception.
Smart contracts have made Ethereum the world’s second-largest cryptocurrency. We explain what Ethereum is and how it fits with the trendy concept of ICOs.
The essence of the HuMachine concept is a fusion of big data, machine learning, and our analysts’ expertise. But what is behind these words?
It’s not paranoia if they’re really out to get you. Remember when people mocked others for covering up their webcams?
About a year ago, a number of people, truly passionate enthusiasts and straight-up frauds alike, started manically preaching the coming of the Blockchain Almighty. It will change the world forever,
People are more into texting than talking. About 65% percent of us would prefer to have a long and painful conversation via Whatsapp than to have one-minute phone call or face-to-face meeting.
In the first part of our story we covered the history of SIM cards. Now let us get down to their security. One of the first vulnerabilities in SIM cards that was
In today’s post, we’ll offer the answers to some questions that Kaspersky Academy fielded to Chief Marketing Officer at Kaspersky Lab, Alexander Erofeev. He will tell us about the role
A SIM card, or Subscriber Identity Module is a familiar element of a mobile phone. It can be easily swapped or replaced, yet, it was not born at the same
In the beginning of 2015, USA Today launched a wave of publications on a handheld radar called RANGE-R that has been used by the U.S. police and other government services. The radar system is
Kaspersky Lab solutions are regularly qualified as the best by a great number of independent security tests. Recently, MRG Effitas awarded Kaspersky Lab’s technology for online banking protection with its
Virtual reality experiments have been continuously carried out since user PCs learned to process graphics. Step by step, the tech has become capable of creating virtual worlds that look relatively
It’s curious how the tone of the discussion has been changing since the topic of driverless cars first received traction in the media. This time last year, the majority of debates centered around
Any new technology can be rough around the edges. The consequences can be complex and there’s high chance for human error, especially when it comes to security.
Bullying isn’t new, of course. But technology has made it easier than ever before for bullies to attack the vulnerable. If you’re a parent, take a look at our checklist of top tips for keeping your children safe from cyberbullying.