Side Eye: eavesdropping using a smartphone’s video camera
How and why did American researchers try to extract sound from a video signal, and was it worth it?
15 articles
How and why did American researchers try to extract sound from a video signal, and was it worth it?
Modern robots are very capable: They can carry heavy loads, jump higher than Olympic champions, walk over rough ground, save lives, protect, and destroy. Smart, useful, dangerous — robots are all that
So, what is a private messenger? Many would just say that a messaging app is private if the messages it conveys are encrypted. But in reality, messaging privacy is a
Our bionic man, Evgeny Chereshnev, had a chance to speak at a TedX event in Kazan. During his 17-minute talk, he discussed what he has learned from having a biochip
Last week, our bionic man, Evgeny Chereshnev, headed to Kazan to speak at a TedX event. During his 17-minute talk, he discussed what he has learned from having a biochip
We have already told you about a number of hacker groups jackpotting money from ATMs. Now you can see it with your own eyes! Our experts shot four videos of
The threat landscape has never been more extensive. In the past, security threats were limited to minor attacks that would cause a small amount of damage to a business. As
The story behind the post is plain and simple: yet another bad guy or a group of bag guys have decided to spread their malicious browser extension using Facebook. While
Mike Mimoso of Threatpost sat down with Vitaly Kamluk of our Global Research and Analysis Team during the Security Analyst Summit 2016 to discuss the latest discovery of the cross-platform
In this short video, we will explain six steps you can take to conveniently maximize the security of your PayPal account.
In 2014 we expect significant growth in the number of threats related to economic and domestic cyber-espionage, with cyber-mercenaries/cyber-detectives playing an active role in such attacks. The full report is
Meet Max, the IT Security Manager. See how Max, with the help of Kaspersky Lab, tackles the IT security battle in this new animation. Find out how IT security takes
The latest in Threatpost‘s ongoing How-To video series, we give tips and tricks on better securing the privacy of your Facebook account.
When it comes to online security, you need to be completely protected. You need hybrid protection, the combined power of the cloud and your PC. As great as cloud security