Google I/O 2015: 7 things you should know about next-gen Android M
At Google I/O 2015, the software giant presented a slew of new features and services. We take a first look at customizable app permissions, Android Pay, Now on Tap, and others.
At Google I/O 2015, the software giant presented a slew of new features and services. We take a first look at customizable app permissions, Android Pay, Now on Tap, and others.
Since the holiday season is upon us, we prepared a list of simple tips to help you minimize risks when renting a car abroad.
I gather our readers have already heard about some controversial Google Glass experiences. Now, it is time to discuss the response by Microsoft, HoloLens augmented reality system.
To hackers’ delight, merchant vessels that transfer about ninety percent of the world’s cargo heavily depend on automation and remote monitoring systems with poor IT security.
Ransomware is a huge problem nowadays, with new examples circulating on a regular basis. Learn how to protect yourself.
Much has been said about the VENOM vulnerability, which is part of the new-age phenomena of Virtualization.
When you look at airplanes moving on a map, you get the feeling it’s sheer Brownian motion. Of course, that’s not the case: aircrafts keep to air tracks all the time.
Using a biochip, Microsoft Kinect, a servo, and a bit of IT magic, we are going to make the imaginary idea of Jedi Force come to life in the real world!
Our personal implementation of the cloud security model is called Kaspersky Security Network. And here we’ll explain how it actually works.
How many research centers do you need to fight for a safer cyber world? We used to have three labs based in Moscow, Beijing, and Seattle. Now, we’re excited to announce the opening of a fourth lab — our new European Research Center based in London.
It was recently discovered that certain Hospira drug infusion pumps contain dangerous and easily exploitable security vulnerabilities.
A legendary Soviet spy, Richard Sorge, is famous for conveying the exact date of the German invasion into the Soviet Union, and for letting the command know Japan had no plans of attacking the USSR in the Far East.
Five lessons from the story of the Enigma cryptographic machine which are still relevant.
During WW2 modern cryptography principles were often coupled with ‘amateur’ ciphering methods. Curiously, the latter ones often proved to be equally reliable
Let’s imagine the things we would have to leave behind as a brand new world of driverless cars is evolving at a full speed (besides the enjoyment of driving itself)
We’ve created an infographic that shows how the Kaspersky Lab flagship antivirus software has improved over the last 10 years.
New research demonstrates that it is possible to hack and hijack devices used to perform remote surgery