How eSIM works
New iPhones support eSIM technology. We explain what it is and who will soon be using it.
100 articles
New iPhones support eSIM technology. We explain what it is and who will soon be using it.
A look at how payment information is protected on smartphones that support contactless payments.
The European Commission’s proposed ePrivacy Regulation takes effect in May 2018. Why is it a battle — and who is fighting for what?
Almost every new smartphone now lets you unlock it with your face — and that’s really bad for security.
Solar power and wind energy could one day replace oil and gas.
The infrastructure for electric cars is developing, and the number of cars grows rapidly. But do providers even care about security?
Along with economic benefits, any new technology also comes with a certain number of problems. Cryptocurrencies are no exception.
Smart contracts have made Ethereum the world’s second-largest cryptocurrency. We explain what Ethereum is and how it fits with the trendy concept of ICOs.
Let’s talk about solving blockchain’s six main problems to help it work better, faster, and more efficiently.
Modern technology actually helps phone scammers — what you need to know to stay safe.
Everyone talks about the advantages of Bitcoin and blockchain, but we never seem to hear about their disadvantages. Perhaps now is the time.
The essence of the HuMachine concept is a fusion of big data, machine learning, and our analysts’ expertise. But what is behind these words?
Modern robots are very capable: They can carry heavy loads, jump higher than Olympic champions, walk over rough ground, save lives, protect, and destroy. Smart, useful, dangerous — robots are all that
About a year ago, a number of people, truly passionate enthusiasts and straight-up frauds alike, started manically preaching the coming of the Blockchain Almighty. It will change the world forever,
Who among us has never tried to imagine what future lies ahead? The average citizen might think a month or a year ahead, but futurologists try to forecast the destiny
Over the past few weeks, teams from 19 universities in the US and UK competed in Kaspersky Lab’s Cybersecurity Case Study Competition, hosted by The Economist’s Which MBA? site. The
Lately, tech companies have gone absolutely crazy for machine learning. They say it solves the problems only people could crack before. Some even go as far as calling it “artificial
Lately, millions of PCs all over the world have been regularly displaying a Microsoft notification reading, in essence: “Dear users, how about if you upgrade to Windows 10?” Sometimes, the
We all know that our opinions on what to expose and what to conceive has changed over time. Consequently, people used specific methods to convey something private so it is
In one of the previous installments of our GSM saga we mentioned an urban legend of hijacking encryption keys on the fly. It presupposes someone can clone your SIM card