VPN implementations and their peculiarities
In a previous post, we discussed the definition of VPN (Virtual Private Network), its purpose and various use cases. Today we will review its most prevalent implementations, and their advantages
81 articles
In a previous post, we discussed the definition of VPN (Virtual Private Network), its purpose and various use cases. Today we will review its most prevalent implementations, and their advantages
Over the past week-plus, we have seen an escalation between Apple and the FBI in regards to unlocking the iPhone belonging to one of the shooters involved in the San
Over the past few months, there has been a lot of hype surrounding Virtual Private Networks or VPN for short. The technology has even found its way into home routers,
In the first part of our story we covered the history of SIM cards. Now let us get down to their security. One of the first vulnerabilities in SIM cards
A SIM card, or Subscriber Identity Module is a familiar element of a mobile phone. It can be easily swapped or replaced, yet, it was not born at the same
Quantum computers are said to be coming quite soon and will change the world forever. While that phrase would typically mean a revolution in physics and medicine, the change which
Following recent terrorist attacks accusations against encrypted means of online communications once again became louder. However the proposed solutions could create even more problems. Governments around the world – from
We are often asked by our customers which one of our products is better – Kaspersky Internet Security or Kaspersky Total Security. To that we often ask – What are
The majority of ciphers referenced in historical or fiction works belong to the same family of ciphers — monoalphabetic ciphers. We have already dove into the main vulnerability of this
Every time you speak about how the great revolution in the principles of data transmission and the information security principles was sparked by the Internet, make sure to remember one
The so-called book cipher has always been in favor with authors of spy novels and detective stories, who usually try to mimic reality but are not ready to feed hardcore
Everyone has heard of the German cipher machine called Enigma, mostly due to the fact its story fascinates all kinds of writers and filmmakers – most recently in the Oscar-nominated
World War II revolutionized many technologies, including those that shaped the modern InfoSec industry. Back then, methods and machines utilizing modern cryptography principles were often coupled with ‘amateur’ ciphering methods.
Let’s identify the main IT security and protection trends at MWC 2015.
New version of CTB-Locker, a ransomware that uses Tor and Bitcoin to evade detection and takedowns, should be avoided at all costs.
What are the key differences between Kaspersky Total Security and Kaspersky Internet Security? Which is the best choice for you? Which protects better? Let’s take a closer look.
“British Prime Minister David Cameron to Ban Encrypted Messengers” — Headlines like this are appearing here and there. But what happened exactly?
CES 2015 was a superb event in terms of the amount of new technology per square foot. But, from an information security standpoint, it did not appear all that positive.
In this Talk Security podcast, Threatpost’s Chris Brook and Brian Donohue discuss the move to encrypt the Web, the Regin APT campaign and more.
Google’s mobile operating system joins Apple’s iOS in offering full disk encryption by default to all users in its newest version — Android 5.0 aka Lollipop.