Explainer: Bitcoin mining
Who is mining cryptocurrency such as bitcoins — and where have all the graphics cards gone?
159 articles
Who is mining cryptocurrency such as bitcoins — and where have all the graphics cards gone?
Kaspersky Internet Security prevents eavesdropping through a computer microphone. Here’s how it works.
Everyone is used to seeing targeted ads on the Internet. Now ads employing the same principles are emerging offline.
Our kids will be astronauts, artists, or travelers — whatever they want, because the boring tasks will be performed by robots.
Until very recently, news of blockchain was all around. Now that the hype has passed, let’s contemplate blockchain’s future.
Attentive listeners such as Apple Siri and Amazon Echo have settled down in our houses. What’s the harm?
As we see from recent news, quantum computing is evolving faster than anyone could’ve expected. What does this mean for us, the average users?
For a messaging app to be truly private, encryption is not enough. In this post we discuss the necessary features of private messaging.
Teams from 19 universities in the US and UK competed in Kaspersky Lab’s Cybersecurity Case Study Competition. See what they’ve came up with.
It is very possible that in the foreseeable future information will be stored in DNA, and the term “virus” will get back to its literal meaning.
Lately, tech companies have gone crazy about machine learning. What is machine learning, and what are its implications? Here’s our take on this technology.
We continue our series on the mechanics of Internet advertising. This time we will focus on the the various types of ads and how, precisely, they work.
You aren’t the only one to catch the PokémonGo craze. So have criminals.
If the rumours are true, 40 million Apple iCloud accounts have been hacked.
Do you have some long abandoned accounts? Do you use the same password everywhere? If so, change all of them now!
Millions of user logins for Tumblr and MySpace stolen, up for sale.
Apple SIM, Google Project Fi and, for example, GigSky are all virtual SIM cards. OK, what’s so virtual about them?
Triada is a modular mobile Trojan that actively uses root privileges to substitute system files and uses several clever methods to become almost invisible
A look at the evolution of mobile threats in 2015 and some predictions for 2016
Kaspersky Lab discovered a new banking trojan called Asacub, which had evolved from a simple phishing program into a nearly ultimate threat.