VPN implementations and their peculiarities
In a previous post, we discussed the definition of VPN (Virtual Private Network), its purpose and various use cases. Today we will review its most prevalent implementations, and their advantages
85 articles
In a previous post, we discussed the definition of VPN (Virtual Private Network), its purpose and various use cases. Today we will review its most prevalent implementations, and their advantages
Over the past week-plus, we have seen an escalation between Apple and the FBI in regards to unlocking the iPhone belonging to one of the shooters involved in the San
What exactly is a VPN? There has been a lot of buzz around it, but why do we need it?
SIM cards can be cloned. How is it possible and what does it have to do with cybercriminals?
Observing the evolution the good old SIM card went through and the results so far.
Quantum computers are said to be coming soon. They will definitely change the information security paradigm. How you can prepare to this shift?
People encrypt their communications so strongly that governments cannot access it when there is a need. Is it really bad?
What is the Kaspersky Lab product is best for you? This post outlines the difference between KIS and KTS to help you choose which is better for you.
One of the most interesting ciphers designed to eliminate the vulnerability to symbol frequency analysis was the Vigenere cipher. Which later became the basis of unbreakable one-time pads.
At the recent Google I/O conference, the ‘corporation of good’ announced three projects: Soli, Jacquard, Vault and Abacus. Let’s see what those curios techs are about.
The first technology to enable instant long-distance communication was telegraph. Back in its time, many things which were later to shape current IT infrastructures developed thanks to the telegraph.
We’ve collected the most interesting books and movies which give a lot of detail on how exactly ciphers are solved.
Recently, Apple’s CEO Tim Cook delivered a speech on privacy and security during EPIC’s Champions of Freedom event. Here are the 10 best quotes from his speech.
A legendary Soviet spy, Richard Sorge, is famous for conveying the exact date of the German invasion into the Soviet Union, and for letting the command know Japan had no plans of attacking the USSR in the Far East.
Five lessons from the story of the Enigma cryptographic machine which are still relevant.
During WW2 modern cryptography principles were often coupled with ‘amateur’ ciphering methods. Curiously, the latter ones often proved to be equally reliable
New research demonstrates that it is possible to hack and hijack devices used to perform remote surgery
Let’s identify and discuss the main IT security and protection trends at MWC 2015.
New allegations against the NSA claim the group hacked into the network of the world’s largest SIM card provider, stealing encryption keys to millions of devices.
New version of CTB-Locker, a ransomware that uses Tor and Bitcoin to evade detection and takedowns, should be avoided at all costs.
What are the key differences between Kaspersky Total Security and Kaspersky Internet Security? Which is the best choice for you? Which protects better? Let’s take a closer look.