Do you know what you are sharing with Google?
What does Google know about you and me? Let’s check it with the new “About me” tool.
159 articles
What does Google know about you and me? Let’s check it with the new “About me” tool.
Headlines raise alarm: the greatest hack in history finally reached iOS. Is that really so and who are the potential victims?
A bottle of good scotch in exchange for a day without a smartphone? Would I dare? That’s a piece of cake! That’s what I thought. As it turned out, it’s not that simple nowadays
At the recent Google I/O conference, the ‘corporation of good’ announced three projects: Soli, Jacquard, Vault and Abacus. Let’s see what those curios techs are about.
Just ten days after the remarkable Google I/O event, Apple is holding its own developers conference. Let’s take a look at the new security features.
At Google I/O 2015, the software giant presented a slew of new features and services. We take a first look at customizable app permissions, Android Pay, Now on Tap, and others.
I gather our readers have already heard about some controversial Google Glass experiences. Now, it is time to discuss the response by Microsoft, HoloLens augmented reality system.
Connection inside the aircraft is not that complex: it needs just a Wi-Fi access point. But deploying the channel on the outside is a totally different and fascinating concept.
Mark Zuckerberg has officially allowed dozens of popular apps to operate within the realm of Facebook Messenger.
A Trojan malware called Podec uses popular Russian social network VKontakte, and other channels, to infect Android phones. Beware: it can bypass CAPTCHA.
Kaspersky Lab created a mobile app to find a stolen or lost phone, remotely lock it, or delete sensitive data in case of device theft.
Samsung Pay is set to come out in South Korea and the U.S. this summer. The company isn’t saying much, but we tried to find out what we could about security on the platform.
The design of the current smartwatches is defined by being aimed at geeks. It looks like it will again take Apple to perform its duties carefully iSplaining wearables to ordinary people.
Let’s identify and discuss the main IT security and protection trends at MWC 2015.
Find out about the most interesting gadgets presented at the Mobile World Congress 2015 in Barcelona.
Cyberbullying is one of the unpleasant effects of hyper-socialization that the Internet as a whole – and social networks in particular – bring us. Learn how to protect your children from it.
When it comes to mobile operating systems, there isn’t a conversation these days that discusses a 3rd option and doesn’t mention the need for some “true openness”. But do we really need this kind of openness?
Whether you’re buying or selling a secondhand Apple device, you can be fooled by criminals. We have gathered tips on how to minimize your chances of being taken by such frauds.
As is, a QR code can quickly take you to a site or another resource but not necessarily to the one you really want to visit. Thus Kaspersky Lab offers a free and safe QR scanner!
We have seen a number of cases where a user has deleted our product for Android and ended up with a locked device. Here we discuss why this happens and what can be done about it.
A number of popular Android applications are putting sensitive user data at risk of exposure because the app developers are not fully implementing encryption.