Attack of the clones
SIM cards can be cloned. How is it possible and what does it have to do with cybercriminals?
76 articles
SIM cards can be cloned. How is it possible and what does it have to do with cybercriminals?
A SIM card, or Subscriber Identity Module is a familiar element of a mobile phone. It can be easily swapped or replaced, yet, it was not born at the same
One of the most interesting ciphers designed to eliminate the vulnerability to symbol frequency analysis was the Vigenere cipher. Which later became the basis of unbreakable one-time pads.
At the recent Google I/O conference, the ‘corporation of good’ announced (besides new Android versions, new services and other predictable things), four new projects: Soli, Jacquard, Vault and Abacus. Let’s
Recently, Apple’s CEO Tim Cook made a speech on privacy and security during EPIC’s Champions of Freedom event. We want to share with you 10 best quotes from this speech.
A legendary Soviet spy, Richard Sorge, is famous for conveying the exact date of the German invasion into the Soviet Union, and for letting the command know Japan had no plans of attacking the USSR in the Far East.
Five lessons from the story of the Enigma cryptographic machine which are still relevant.
During WW2 modern cryptography principles were often coupled with ‘amateur’ ciphering methods. Curiously, the latter ones often proved to be equally reliable.
MWC often gladdens our heart with lots of visitors and participants who care much about security and that is quite natural taking into account that the event is held by
The latest in a long line of whistle-blower Edward Snowden’s National Security Agency revelations may be among the most shocking: that the NSA and its British counterpart, GCHQ, allegedly compromised
A new variant of the Onion ransomware has emerged, though you might see it referred to as CTB-locker or Citroni. Whatever you decide to call it, CTB-Locker is a Cryptolocker-like
The new product of ours, Kaspersky Total Security, has just hit the shelves, and our customers have been bombarding us with questions ever since: “What are the key differences between
“British Prime Minister David Cameron to ban encrypted messengers” — headlines like this one are all over the news at the moment, and with good reason. Opinions vary from “Let’s protect
CES 2015 was a superb event in terms of new stuff per square foot, which has been referred to numerous times by tech website reporters. As for me, a person
This November, Kaspersky Lab brought you a number of insightful industry reads and breaking security news stories. From the Darkhotel APT attacks, to how to increase the battery life of
Talk Security podcast hosts Brian Donohue and Chris Brook are back with the news edition of the Talk Security podcast, discussing the Regin APT attack platform and the movement toward
There’s been much hoopla in recent weeks over claims from Apple and Google that user content stored in the latest iterations of the iOS and Android operating systems is encrypted
”Dear Chairman, dear Vice Chairman, dear members of the board, let me present to you the annual report… Oops… Just a moment, we are having some technical issues…”
We have bought our very own Blackphone to check its security firsthand.
Yahoo plans to implement end-to-end encryption for all of its mail users, giving normal, non-technical users the power to communicate securely and privately.
Facebook fails to fully encrypt data on its Instagram mobile app, which puts user security and privacy at risk.