Five lessons from the story of the Enigma cryptographic machine which are still relevant.
During WW2 modern cryptography principles were often coupled with ‘amateur’ ciphering methods. Curiously, the latter ones often proved to be equally reliable
New research demonstrates that it is possible to hack and hijack devices used to perform remote surgery
Big data helps to catch child abusers, drug dealers, and terrorists, and allegedly it also helped to locate Bin Laden.
An annoying story of 'free' WiFi hotspots by St. Petersburg-based Smart WiFi. Nothing is for free, though, as you end up paying with your vk.com credentials
A New York artist made an exhibition out of making a single private and anonymous cell phone call outside the scope of government spying. Here's how he did it:
Fraudsters hacked Skype and tricked people from a contact list to send them about $5,000 over the course of a few days. Skype support, local banks and the police refused to do any...
#BionicManDiary Entry 003 - The one where I bypassed the smartphone's password protection whereas had intended to do a completely different thing
Kaspersky Lab created a mobile app to find a stolen or lost phone, remotely lock it, or delete sensitive data in case of device theft.
Let's identify the main IT security and protection trends at MWC 2015.