My home is my castle: Security technologies for the house
Smart home systems, drones, AI — we discuss the new trends and technologies in the field of home security.
159 articles
Smart home systems, drones, AI — we discuss the new trends and technologies in the field of home security.
Hacking security cameras through a smart light switch — and other interesting features of smart homes.
Apple to roll out a system of its own for quick login to websites and apps. Learn what makes it different from similar offers.
Eugene Kaspersky’s thoughts on the latest updates to our Earth 2050 futurological project.
Emulator in Kaspersky Lab products: what is it and why it’s so important for antivirus to have one.
Has your sat nav ever insisted you are somewhere you are clearly not? Welcome to GPS spoofing.
Artificial intelligence assists judges, police officers, and doctors. But what guides the decision-making process?
We explain how ultrasound and audio recordings hidden in background noise can be used to control voice assistants.
Analysis of a German sex toy reveals all sorts of vulnerabilities.
New iPhones support eSIM technology. We explain what it is and who will soon be using it.
Security researchers found several ways to compromise hardware cryptocurrency wallets made by Ledger and Trezor.
Experts discovered lots of interesting things in the code of North Korean antivirus SiliVaccine.
Meet Lenny, the voice chatbot that can be used against telemarketers and phone scammers.
The year 2018 passed under the sign of Spectre and Meltdown hardware vulnerabilities. What does 2019 have in store in this regard?
Smart home appliances are dependent on remote servers, apps, and other things, which can cause all kinds of trouble.
Blockchain was designed to reliably store data forever. Unfortunately, such design conflicts with modern privacy legislation trends.
The story of patent US5490216, which struck terror in the hearts of IT professionals and cost a whole lot of tech companies hundreds of millions of dollars.
What surprises do machine learning have in store for us? How difficult is it to trick a machine? And will we end up with Skynet and rise of the machines? Let’s take a look.
It’s not Malevich’s Black Square. This is what a screenshot taken by a suspicious application on a computer protected by Kaspersky Lab products looks like.
How tools designed to study and protect rare species can turn from gamekeeper to poacher.