
You can’t replace your face, says face recognition
Unless you are from Russia, you probably haven’t heard of a service, that analyzes an image of a person and finds their account in VK.com social network. It’s called FindFace.
691 articles
Unless you are from Russia, you probably haven’t heard of a service, that analyzes an image of a person and finds their account in VK.com social network. It’s called FindFace.
The concept is simple: all posts must be limited to 140 characters maximum. Despite it’s simple concept, the site sure has grown. The simple idea of Twitter has allowed it
The story behind the post is plain and simple: yet another bad guy or a group of bag guys have decided to spread their malicious browser extension using Facebook. While
Typically we don’t cheer bugs. However, today we’ll make an exception. You see a bug or flaw in the code of Petya ransomware has allowed a developer to create a
Ad banners can show false and even dangerous information, launch noisy videos without permission and consume a lot of traffic. If you use mobile connection, viewing ads can be a
Over the years, the number of cyberattacks have been constantly growing. But not only have they grown, they’ve become more sophisticated and harder to prevent. So many more things and
We often look at the past and have memories of a time when our worries were smaller and our lives were simpler. But looking back over the last 20 years,
Unlike the majority of social media sites, LinkedIn is business oriented and focused on networking. This allows it to stand out and has contributed to its immense popularity. However, as
How long has it been since you were last alone? Probably never! Even within the walls of your skull you’re never really alone. For enemies are everywhere — since time
No matter how old you are, it’s most likely you know all about stately Wayne Manor and its billionaire owner, Bruce Wayne. If you don’t you probably have heard of
As you might have noticed, a security browser extension called Kaspersky Protection is installed simultaneously with our security solutions. In this post we will explain what it does and how
We’ve all seen age-based rating labels displayed prominently before the TV shows or featured on website headings, print media title pages, or theater posters. Did you know that these labels
When I was in middle school a friend of mine got a computer, soon after that he got this cool program called AOL and it instantly made his house the
When a product is built, the manufacturer typically has a lifecycle in mind in regards to how long a consumer will ideally use the device. For example smartphones are something
Two-factor authentication with SMS is widely used by banking institutions. Of course, this measure works better than a mere password but it’s not unbreakable. Security specialists found out how it
In a previous post, we discussed the definition of VPN (Virtual Private Network), its purpose and various use cases. Today we will review its most prevalent implementations, and their advantages
Please stop me if you have heard this before: ‘I don’t need a security solution for my Mac. They are super-secure and are completely immune to viruses.’ Do you believe
Even if you don’t use it, it’s likely that you’ve heard of the popular microblogging site Tumblr. With its 275 million blogs, Tumblr has become a very popular social network,
You may not know this, but when you request something from a search engine, buy a product from an online shop, visit your favorite blog or read the latest news
During the RSA Conference in San Francisco Stephen Balkam, Founder and CEO of the Family Online Safety Institute gave a presentation focused on the Risks, Harms and Rewards of our
When the iPhone and app store rolled out, there was a phrase that became ubiquitous to our lives becoming more connected: “There’s an app for that.” Fast-forward to 2016 and