
Google I/O 2016: Smartphones are not the limit for Android
The annual Google I/O conference traditionally gathers developers to give them the sense of direction for the upcoming year. This year was no exception: The audience got some insights on
568 articles
The annual Google I/O conference traditionally gathers developers to give them the sense of direction for the upcoming year. This year was no exception: The audience got some insights on
Today, the thing I dreaded would happen sooner or later, finally occurred: I arrived at work, put my hand onto the turngate… and nothing happened. It didn’t let me in.
Great news – you purchased a new iPad! Of course, you’ll want to set it up, install a number of apps and start using it on all cylinders. So, let’s
In the United States, the political season is heating up as the country is prepping for their presidential election for the successor to Barack Obama. The whole process of political
I was blinded with a strong light and then was asked the life-and-death question: “What did you do on the 5th of the last month between 10 PM and 11:30
Apple iPhone users are notorious for their slight indulgence towards those who prefer alternative platforms. Android is constantly under attack by malware and Trojans, they say, while iOS is immune
Over the past few years drones have evolved from toys to powerful tools that can be used by pretty much everybody. Armies use them for scouting and aerial spotting, coast-guards
The common user experience when it comes to ransomware looks like this: you open a website then accidentally download and install a piece of software. You might even not notice
The concept is simple: all posts must be limited to 140 characters maximum. Despite it’s simple concept, the site sure has grown. The simple idea of Twitter has allowed it
The threat landscape has never been more extensive. In the past, security threats were limited to minor attacks that would cause a small amount of damage to a business. As
In what will be our final chapter of our ‘Introduction to VPN’ course, I will tell you something beyond the usual tech jabber on VPN. I’ll cover some technical and
The biggest data breach in history happened when Mossack Fonseca papers fell into the hands of German journalists. The leaked a 2.6 terabyte archive that included 11.5 million documents —
Everyone from citizens to corporations to special services and government organizations is fed up with ransomware. With all of the potential victims, the United States and Canada released a joint
Over the years, the number of cyberattacks have been constantly growing. But not only have they grown, they’ve become more sophisticated and harder to prevent. So many more things and
Unlike the majority of social media sites, LinkedIn is business oriented and focused on networking. This allows it to stand out and has contributed to its immense popularity. However, as
How long has it been since you were last alone? Probably never! Even within the walls of your skull you’re never really alone. For enemies are everywhere — since time
Doctors and patients across the world, beware: cyberciminals have a new member of the family! Despite its young age, a one-month-old ransomware has already encrypted files in two American hospitals
As you might have noticed, a security browser extension called Kaspersky Protection is installed simultaneously with our security solutions. In this post we will explain what it does and how
In one of the previous installments of our GSM saga we mentioned an urban legend of hijacking encryption keys on the fly. It presupposes someone can clone your SIM card
When a product is built, the manufacturer typically has a lifecycle in mind in regards to how long a consumer will ideally use the device. For example smartphones are something
Since last year, there is no doubt that it’s possible to take control over a connected car remotely. Despite this, we can see zero uncontrolled cars on the streets that