
Apple Watch And The Others
The design of the current smartwatches is defined by being aimed at geeks. It looks like it will again take Apple to perform its duties carefully iSplaining wearables to ordinary people.
3365 articles
The design of the current smartwatches is defined by being aimed at geeks. It looks like it will again take Apple to perform its duties carefully iSplaining wearables to ordinary people.
Let’s identify the main IT security and protection trends at MWC 2015.
An airborne plane is one of the safest places on the planet. However, there are rules to abide by in order to make sure the flight is a comfortable and pleasant experience.
During my first two weeks of the biochip experience I had time to mull over a lot of things. In this post I’m going to touch upon the subject of form factor.
Find out about the most interesting gadgets presented at the Mobile World Congress 2015 in Barcelona
Cyberbullying is one of the unpleasant effects of hyper-socialization that the Internet as a whole – and social networks in particular – bring us. Learn how to protect your children from it.
When it comes to Mobile OSes, every 3rd option conversation these days mentions the need for some “true openness”. But do we really need this kind of openness?
Scientifically proven: video games may really boost your intellectual abilities.
The story of how a biochip was implanted into my hand and why I needed it.
Brian Donohue and Chris Brook of Threatpost discuss Kaspersky Lab’s Security Analyst Summit, which took place last week in Cancun, Mexico
It turned out that Lenovo’s laptops had been shipped with an adware called Superfish. It possibly allows eavesdropping on encrypted connections.
Do you like working in open plan office? Many say no. That can be remedied by new ideas introduced by office space designers.
Kaspersky Lab researchers uncovered Desert Falcons, the first exclusively Arabic APT group, presenting their findings at the Security Analyst Summit in Cancun.
There is a flood of appliances which could be connected – and some are connected – without a second thought as to whether or not it’s necessary or secure.
Let’s talk about the dangers of cross-border payments with plastic cards and security flaws in payment systems architecture.
A malware that cannot be wiped from the victim’s hard drive does exist. However, it’s so rare and expensive, that you probably won’t ever encounter it.
The Carbanak APT group managed to steal a total of $1 bln from dozens of banks worldwide
Buried in Samsung’s terms of service is the admission that spoken words are picked up and passed along to third parties by voice recognition.
In this talk security podcast, Chris Brook and Brian Donohue discuss the upcoming Security Analyst Summit, Flash zero days, the Ghost vulnerability and the Anthem breach
Many would see an aircraft just the way they see a car: should it be 15 or 20 years old, it is automatically perceived as obsolete. This reasoning is misleading.
WhatsApp has finally released a Web version of its popular mobile messaging service. We take a look at it from the security perspective.