10 best quotes from Tim Cook’s recent speech on privacy and security
Recently, Apple’s CEO Tim Cook made a speech on privacy and security during EPIC’s Champions of Freedom event. We want to share with you 10 best quotes from this speech.
462 articles
Recently, Apple’s CEO Tim Cook made a speech on privacy and security during EPIC’s Champions of Freedom event. We want to share with you 10 best quotes from this speech.
Kaspersky Lab experts detected a shifty scheme that allows fraudsters steal personal data without your login and password.
At Google I/O 2015 software giant have presented a whole bunch of new features and services. Let’s take a first look at customizable app permissions, Android Pay, Now on Tap and others.
Our own implementation of a cloud security model is called Kaspersky Security Network. And here we’ll explain how it actually works
Five lessons from the story of the Enigma cryptographic machine which are still relevant.
During WW2 modern cryptography principles were often coupled with ‘amateur’ ciphering methods. Curiously, the latter ones often proved to be equally reliable.
Big data helps to catch child abusers, drug dealers, and terrorists, and allegedly it has also helped to locate Bin Laden
A New York artist made an exhibition out of making a single private and anonymous cell phone call outside the scope of government spying. Here’s how he did it.
Editorial note: Sergey Dolya, the author of this post is one of the most popular Russian bloggers. This story has happened recently with one of his friends. As it turned
MWC often gladdens our heart with lots of visitors and participants who care much about security and that is quite natural taking into account that the event is held by
During my first two weeks of the biochip experience I had time to mull over a lot of things. The deluge of questions from the community pushed this process further:
Do you know what your child is doing when s/he holding smartphone or tablet in his/her hands? Maybe everything is fine and s/he is just watching movies or playing game.
The latest privacy-related kerfuffle, involving Lenovo, who thought it was a great idea to pre-install some very nasty adware with gaping security holes, was like a blast from the past.
The latest in a long line of whistle-blower Edward Snowden’s National Security Agency revelations may be among the most shocking: that the NSA and its British counterpart, GCHQ, allegedly compromised
I woke up to find a Band-Aid on my hand. It was covering a small wound between the thumb and the index finger. That was when I had a WTF moment.
On February 19th of 2015, it came out that Lenovo’s laptops had been shipped with an adware Superfish preinstalled. There are two major problems with this issue. The first one is
Frequently we (and many, many others) write about different skimming techniques and other ways of compromising bank cards. Today, we’ll talk about the less apparent dangers that run the risk of
A couple of weeks ago someone posted the following quote from Samsung’s Smart TV terms of service on Reddit: “Please be aware that if your spoken words include personal or
The popular mobile messaging service WhatsApp released WhatsApp Web late last month. The service will allow users to run WhatsApp on their favorite Web browser — so long as their
Once a user looks up a laptop or a slow cooker online, advertisements from online stores will begin to appear as if from the horn of abundance. This is exactly
Every year millions of people become victims of a data breach. For the majority, the results are the same: hackers sell users’ data on underground websites and companies have to rush