How to hack a hardware cryptocurrency wallet
Security researchers found several ways to compromise hardware cryptocurrency wallets made by Ledger and Trezor.
164 articles
Security researchers found several ways to compromise hardware cryptocurrency wallets made by Ledger and Trezor.
Experts discovered lots of interesting things in the code of North Korean antivirus SiliVaccine.
Meet Lenny, the voice chatbot that can be used against telemarketers and phone scammers.
The year 2018 passed under the sign of Spectre and Meltdown hardware vulnerabilities. What does 2019 have in store in this regard?
Smart home appliances are dependent on remote servers, apps, and other things, which can cause all kinds of trouble.
Blockchain was designed to reliably store data forever. Unfortunately, such design conflicts with modern privacy legislation trends.
The story of patent US5490216, which struck terror in the hearts of IT professionals and cost a whole lot of tech companies hundreds of millions of dollars.
It’s not Malevich’s Black Square. This is what a screenshot taken by a suspicious application on a computer protected by Kaspersky Lab products looks like.
How tools designed to study and protect rare species can turn from gamekeeper to poacher.
Advertising in voice assistants is coming soon. We examine how it will use personal data and what you can do about it.
A look at how payment information is protected on smartphones that support contactless payments.
We explain what digital certificates are, what types exist, and what problems are associated with them.
Rumor has it that typing “BFF” as a Facebook comment checks your profile security. We investigate the claim.
Researchers investigate how vulnerabilities in robots can be exploited to take control of them.
Almost every new smartphone now lets you unlock it with your face — and that’s really bad for security.
Solar power and wind energy could one day replace oil and gas.
Two new fingerprint-scanning technologies revealed at Mobile World Congress 2018 use different approaches.
Chrome learns to block ads by itself. What has Google come up with, and how will it help users?
The infrastructure for electric cars is developing, and the number of cars grows rapidly. But do providers even care about security?
Do you use NAS for backup? We’ll tell you how to protect it from new threats