At Google I/O 2015, the software giant presented a slew of new features and services. We take a first look at customizable app permissions, Android Pay, Now on Tap, and others.
Our personal implementation of the cloud security model is called Kaspersky Security Network. And here we'll explain how it actually works.
Five lessons from the story of the Enigma cryptographic machine which are still relevant.
During WW2 modern cryptography principles were often coupled with ‘amateur’ ciphering methods. Curiously, the latter ones often proved to be equally reliable
New research demonstrates that it is possible to hack and hijack devices used to perform remote surgery
Big data helps to catch child abusers, drug dealers, and terrorists, and allegedly it also helped to locate Bin Laden.
An annoying story of 'free' WiFi hotspots by St. Petersburg-based Smart WiFi. Nothing is for free, though, as you end up paying with your vk.com credentials
A New York artist made an exhibition out of making a single private and anonymous cell phone call outside the scope of government spying. Here's how he did it:
Fraudsters hacked Skype and tricked people from a contact list to send them about $5,000 over the course of a few days. Skype support, local banks and the police refused to do any...
#BionicManDiary Entry 003 - The one where I bypassed the smartphone's password protection whereas had intended to do a completely different thing