Ericsson and Qualcomm are promoting their new technology, LTE-U. Is it any better that LTE-A? And what is this combinations of letters supposed to mean, after all?
Taking over a Jeep Cherokee driving at speed 70 mph at a remote highway is quite real.
A bottle of good scotch in exchange for a day without a smartphone? Would I dare? That's a piece of cake! That's what I thought. As it turned out, it's not that simple nowadays
Private data of 37 million users are at risk after a huge data breach on the popular Ashley Madison dating site.
Cybercriminals often pretend to be nice and amiable. Here are a few rules how not to become a victim of these malicious folks.
In next 10-20 years UAVs, in one or another manner, will become an integral part of our life, but still remain highly prone to vulnerabilities and security issues.
Andrey Pozhogin, cybersecurity expert at Kaspersky Lab, provides his expertise on the growing trend of ransomware attacks and what users and companies can do to protect themselves
The TeslaCrypt ransomware family is notable for targeting games-related files, as well as the usual documents. In the new version, it became even more dangerous.
Want to defeat a cybercriminal? Stay calm, be smart, and check twice. Here is a list of security rules for every smart person who cares about cybersecurity.
Hackers and cyberspies are not something you only see at the movies. The Internet is actually crawling with weirdos and criminals who are just looking for a chance to infect your ...