Side Eye: eavesdropping using a smartphone’s video camera
How and why did American researchers try to extract sound from a video signal, and was it worth it?
15 articles
How and why did American researchers try to extract sound from a video signal, and was it worth it?
Our kids will be astronauts, artists, or travelers — whatever they want, because the boring tasks will be performed by robots.
For a messaging app to be truly private, encryption is not enough. In this post we discuss the necessary features of private messaging.
Do you really think you are the owner of your data? Watch the video with Evgeny Chereshnev from TedX Kazan and think again
How are criminals able to hack ATMs and get away with money? Here are four videos that show how ATMs can be vulnerable.
For the pilot of our “The daily life of…” series, we filmed David Jacoby — at home and out about town
Ryan Naraine and Juan Andrés Guerrero-Saade discuss the threat landscape and what is being done to pre-vent major attacks.
Check this out to know if you want to fall for one of the latest Facebook scams
Vitaly Kamluk of the Kaspersky GReAT discusses Adwind during the SAS 2016.
In this short video, we will explain six steps you can take to conveniently maximize the security of your PayPal account.
In 2014 we expect significant growth in the number of threats related to economic and domestic cyber-espionage, with cyber-mercenaries/cyber-detectives playing an active role in such attacks. The full report is
Meet Max, the IT Security Manager. See how Max, with the help of Kaspersky Lab, tackles the IT security battle in this new animation. Find out how IT security takes
The latest in Threatpost‘s ongoing How-To video series, we give tips and tricks on better securing the privacy of your Facebook account.
When it comes to online security, you need to be completely protected. You need hybrid protection, the combined power of the cloud and your PC. As great as cloud security