A 3D printer can print paws for dogs, beaks for toucans and jaws for turtles. And yes, it saves their lives.
SIM cards can be cloned. How is it possible and what does it have to do with cybercriminals?
Alexander Erofeev talks on who is the most interested in IT security knowledge, on life without technology and on predictions of the Internet existence.
Observing the evolution the good old SIM card went through and the results so far
In Back to the Future 2, Marty McFly and co. come to 2015. Let’s see, which forecasts of this legendary saga are true and which are false.
Ericsson and Qualcomm are promoting their new technology, LTE-U. Is it any better that LTE-A? And what is this combinations of letters supposed to mean, after all?
In next 10-20 years UAVs, in one or another manner, will become an integral part of our life, but still remain highly prone to vulnerabilities and security issues.
MRG Effitas awarded Kaspersky Lab its highest accolade for the development of reliable security technology for online banking.
I gather our readers have already heard about some controversial Google Glass experiences. Now, it is time to discuss the response by Microsoft, HoloLens augmented reality system.
Let’s imagine the things we would have to leave behind as a brand new world of driverless cars is evolving at a full speed (besides the enjoyment of driving itself)