How my face got stolen
Some time ago we tested FindFace, a service that compares photos with the database of avatars from the VK.com social network and looks for matches. Back then, my colleagues had some
231 articles
Some time ago we tested FindFace, a service that compares photos with the database of avatars from the VK.com social network and looks for matches. Back then, my colleagues had some
1. What is a VPN? From Wikipedia’s current definition: “A virtual private network (VPN) is a virtualized extension of a private network across a public network such as the Internet.”
Main Findings The rapid growth in the use of applications has significantly added to the digital clutter that exists on people’s digital devices: for example, users typically install 12 Android
Calling Captain Obvious…come in, Captain Obvious: Which IT threat brings the most danger to enterprises, SMBs, governments, and individuals? The answer, of course, is data breaches. Now: Which data breaches are
Nowadays the proverb “the walls have ears” is not as metaphoric as it used to be. “The telescreen received and transmitted simultaneously. Any sound that Winston made, above the level
Recent news about IP cameras being hacked and private footage sold unlawfully online has bestirred the Internet yet again. Such headlines are now unsurprising; however, one new case has a sensitive twist:
In the face of malware, Android has a very good defense mechanism — the app permissions system. This system defines a set of actions an app is allowed (or not
Hi, my name is Serge, and I just realized that I have been an active Internet user for 20 years. Seriously, this year I should celebrate an anniversary, but instead
Meitu, the ‘anime-makeover’ app is doing something that users perhaps didn’t realize they’d signed up to. It’s been found to be harvesting all sorts of data on users, including your location, reading,
Have you ever visited Amazon.com only to find items you’d forgotten in your shopping cart? Returned to Hulu and found you were already logged in? Have you ever noticed how
So, what is a private messenger? Many would just say that a messaging app is private if the messages it conveys are encrypted. But in reality, messaging privacy is a
Public awareness of — and wariness about — Web privacy continues to grow. That should come as no surprise: These days, pervasive cybertracking affects everyone. In this article, the last
Our bionic man, Evgeny Chereshnev, had a chance to speak at a TedX event in Kazan. During his 17-minute talk, he discussed what he has learned from having a biochip
A recent survey of 4,831 active social network users, conducted by Kaspersky Lab in 12 countries, reveals that an overwhelming majority (78%) of respondents considered quitting their social networks —
An old-school habit, labelling the back of photos, has transitioned into something more appropriate for the digital age. These days, one needn’t scribble comments on a photo; your camera, an
Even people who avoid online services can find their lives affected by them. For example, one morning you might wake up to find your usually quiet local street has become
Last week, our bionic man, Evgeny Chereshnev, headed to Kazan to speak at a TedX event. During his 17-minute talk, he discussed what he has learned from having a biochip
In the previous installment of our series about online advertising, we gave a definition of the players involved in digital marketing and a brief description of the payment models used
Danger often comes from an unexpected direction. For example, while you are alert to pickpockets, criminals may be approaching invisibly, over Wi-Fi. Here’s a typical scenario: Let’s say you meet
Today Google releases the Allo app — a new messaging app that was expected to provide a few cool features as well as privacy for its users. But the company