Hacking a car: a real threat or yet another shocker?
2015 proved: it’s possible to hack a connected car remotely. But is it as dangerous as it seems?
45 articles
2015 proved: it’s possible to hack a connected car remotely. But is it as dangerous as it seems?
Quantum computers are said to be coming soon. They will definitely change the information security paradigm. How you can prepare to this shift?
In Back to the Future 2, Marty McFly and co. come to 2015. Let’s see, which forecasts of this legendary saga are true and which are false.
Facial recognition algorithms can track your movements with amazing accuracy. But if you know how they work you can trick them.
The new trend on IFA 2015 is all about integrity and security. Meet Kaspersky Lab’s observations from the trade show.
Just think of the sticky fingers of banks, marketers and insurers that hunt for your personal data with revolting impudence and store them unsecured. So, what’s the fuss about?
Ericsson and Qualcomm are promoting their new technology, LTE-U. Is it any better that LTE-A? And what is this combinations of letters supposed to mean, after all?
In next 10-20 years UAVs, in one or another manner, will become an integral part of our life, but still remain highly prone to vulnerabilities and security issues.
What do a billionaire inventor Elon Musk, the Google Now on Tap service and the recent “Ex Machina” movie have in common? Obviously, they all are about artificial intelligence
Using a biochip, Microsoft Kinect, a servo, and a bit of IT magic, we are going to make the imaginary idea of Jedi Force come to life in the real world!
Let’s imagine the things we would have to leave behind as a brand new world of driverless cars is evolving at a full speed (besides the enjoyment of driving itself)
Technologies which seemed like they were from science fiction yesterday, are entering our everyday lives. One such tech is direct neural interfaces.
Everybody knows about flying drones, but there are also swimming and diving drones that patrol ports and ships, demine shores and so on. Let’s take a closer look at maritime robots.
There are many cool and funny projects in the world that deal with big data and we’ve gathered the Top 10 list of the most interesting ones. See for yourself!
#BionicManDiary Entry 003 – The one where I bypassed the smartphone’s password protection whereas had intended to do a completely different thing
The design of the current smartwatches is defined by being aimed at geeks. It looks like it will again take Apple to perform its duties carefully iSplaining wearables to ordinary people.
During my first two weeks of the biochip experience I had time to mull over a lot of things. In this post I’m going to touch upon the subject of form factor.
The story of how a biochip was implanted into my hand and why I needed it.
Have you ever wondered how a typical office would look in a decade or so? Allow us to take you on a small tour of the most interesting office concepts.
CES 2015 was a superb event in terms of the amount of new technology per square foot. But, from an information security standpoint, it did not appear all that positive.