How to pay for ‘free wifi’ with your social network account password
In theory, it’s common knowledge that “there’s no such thing as a free lunch”, but when it comes to practice, some forget about the ‘free lunch’ proverb and prefer another
1401 articles
In theory, it’s common knowledge that “there’s no such thing as a free lunch”, but when it comes to practice, some forget about the ‘free lunch’ proverb and prefer another
There are many cool and funny projects in the world that deal with big data and we’ve gathered the Top 10 list of the most interesting ones. See for yourself!
Connection inside the aircraft is not that complex: it needs just a Wi-Fi access point, end of story. But deploying the channel on the outside is a totally different and fascinating concept
Tech giants Intel and IBM are seeking to hire Bitcoin experts, but their interest appears to be focussed on the service’s public ledger rather than the cryptocurrency itself
Mark Zuckerberg has officially allowed dozens of popular apps to operate within the realm of his Facebook Messenger
Fraudsters hacked Skype and tricked people from a contact list to send them about $5,000 over the course of a few days. Skype support, local banks and the police refused to do anything.
Windows 10 will offer users the ability to authenticate themselves with biometric identifiers rather than passwords
#BionicManDiary Entry 003 – The one where I bypassed the smartphone’s password protection whereas had intended to do a completely different thing
A Trojan malware called Podec uses popular Russian social network VKontakte, and other channels, to infect Android phones. Beware: It can bypass CAPTCHA.
Kaspersky Lab created a mobile app to find a stolen or lost phone, remotely lock it, or delete sensitive data in case of device theft.
Samsung Pay is set to come out in South Korea and the U.S. this summer. The company isn’t saying much, but we tried to find out what we could about security on the platform
The design of the current smartwatches is defined by being aimed at geeks. It looks like it will again take Apple to perform its duties carefully iSplaining wearables to ordinary people.
Let’s identify the main IT security and protection trends at MWC 2015.
During my first two weeks of the biochip experience I had time to mull over a lot of things. In this post I’m going to touch upon the subject of form factor.
Find out about the most interesting gadgets presented at the Mobile World Congress 2015 in Barcelona
Cyberbullying is one of the unpleasant effects of hyper-socialization that the Internet as a whole – and social networks in particular – bring us. Learn how to protect your children from it.
When it comes to Mobile OSes, every 3rd option conversation these days mentions the need for some “true openness”. But do we really need this kind of openness?
Scientifically proven: video games may really boost your intellectual abilities.
The story of how a biochip was implanted into my hand and why I needed it.
Brian Donohue and Chris Brook of Threatpost discuss Kaspersky Lab’s Security Analyst Summit, which took place last week in Cancun, Mexico
It turned out that Lenovo’s laptops had been shipped with an adware called Superfish. It possibly allows eavesdropping on encrypted connections.