I gather our readers have already heard about some controversial Google Glass experiences. Now, it is time to discuss the response by Microsoft, HoloLens augmented reality system.
While LTE networks are seemingly just now starting to take off, networking vendors and carriers are already fully engaged in a vivid discussion on 5G's perspectives. What are thos...
To hackers’ delight, merchant vessels that transfer about ninety percent of the world's cargo heavily depend on automation and remote monitoring systems with poor IT security.
Ransomware is a huge problem nowadays, with new examples circulating on a regular basis. Learn how to protect yourself.
Much has been said about the VENOM vulnerability, which is part of the new-age phenomena of Virtualization.
A new, Chinese-language APT has emerged, seeking geopolitical information and targeting nations in and around the South China Sea
When you look at airplanes moving on a map, you get the feeling it's sheer Brownian motion. Of course, that's not the case: aircrafts keep to air tracks all the time.
Using a biochip, Microsoft Kinect, a servo, and a bit of IT magic, we are going to make the imaginary idea of Jedi Force come to life in the real world!
Our personal implementation of the cloud security model is called Kaspersky Security Network. And here we'll explain how it actually works.
How many research centers do you need to fight for a safer cyber world? We used to have three labs based in Moscow, Beijing, and Seattle. Now, we’re excited to announce the openin...