
Earth-2050: A glimpse into the future
Who among us has never tried to imagine what future lies ahead? The average citizen might think a month or a year ahead, but futurologists try to forecast the destiny
107 articles
Who among us has never tried to imagine what future lies ahead? The average citizen might think a month or a year ahead, but futurologists try to forecast the destiny
Over the past few weeks, teams from 19 universities in the US and UK competed in Kaspersky Lab’s Cybersecurity Case Study Competition, hosted by The Economist’s Which MBA? site. The
Lately, tech companies have gone absolutely crazy for machine learning. They say it solves the problems only people could crack before. Some even go as far as calling it “artificial
Lately, millions of PCs all over the world have been regularly displaying a Microsoft notification reading, in essence: “Dear users, how about if you upgrade to Windows 10?” Sometimes, the
We all know that our opinions on what to expose and what to conceive has changed over time. Consequently, people used specific methods to convey something private so it is
In one of the previous installments of our GSM saga we mentioned an urban legend of hijacking encryption keys on the fly. It presupposes someone can clone your SIM card
Recently engineers who have been working to improve legacy cellular technologies, were stricken with a thought: “Why would one need a SIM card, if it’s nothing more than a protected data
3D-printing is a unique technology — it lets you produce almost anything quickly and accurately. Moreover, items can be printed using different materials like plastic, metal, wax and so on.
In the first part of our story we covered the history of SIM cards. Now let us get down to their security. One of the first vulnerabilities in SIM cards
In today’s post, we’ll offer the answers to some questions that Kaspersky Academy fielded to Chief Marketing Officer at Kaspersky Lab, Alexander Erofeev. He will tell us about the role
A SIM card, or Subscriber Identity Module is a familiar element of a mobile phone. It can be easily swapped or replaced, yet, it was not born at the same
October 21, 2015 is the date that holds a special place in the hearts of all Back to the Future saga fans. This is the date Marty McFly arrives on
Recently Ericsson and Qualcomm have begun promoting their state-of-art technology, LTE-U. Is it any better that LTE-A, which is increasingly available all over the world, including US, Europe, Russia, China
Recently I had the opportunity to attend the Changellenge Cup Russia 2015 student project competition. I was on the panel of judges for one of the sections. But today we
Kaspersky Lab solutions are regularly qualified as the best by a great number of independent security tests. Recently, MRG Effitas awarded Kaspersky Lab’s technology for online banking protection with its
Virtual reality experiments have been continuously carried out since user PCs learned to process graphics. Step by step, the tech has become capable of creating virtual worlds that look relatively
It’s curious how the tone of the discussion has been changing since the topic of driverless cars first received traction in the media. This time last year, the majority of debates centered around
Any new technology can be rough around the edges. The consequences can be complex and there’s high chance for human error, especially when it comes to security.
Bullying isn’t new, of course. But technology has made it easier than ever before for bullies to attack the vulnerable. If you’re a parent, take a look at our checklist of top tips for keeping your children safe from cyberbullying.
Bitcoin is a cryptocurrency that owes much of its popularity to its rather volatile — and occasionally very high — price. Its potential for investors has made it a tempting