Privacy-Preserving Attribution technology by Mozilla
In the wake of Google and Facebook, Mozilla has introduced its own technology for replacing third-party cookies: let’s take a look at how privacy-preserving attribution works.
32 articles
In the wake of Google and Facebook, Mozilla has introduced its own technology for replacing third-party cookies: let’s take a look at how privacy-preserving attribution works.
Researchers have learned to recognize the positions and poses of people indoors using Wi-Fi signals. To do this, they used ordinary home routers and machine learning.
Security companies offer smart technologies — primarily cameras — to protect your home from burglary, fire and other incidents. But what about protecting these security systems themselves from intruders? We fill this gap.
Smart feeders were invented to make life easier for pet owners; however, their vulnerabilities threaten not only owners’ privacy, but also the health of their pets.
Get all the benefits of a VPN — not just on your phone, but on your home computer, game console and smart TV too. The easiest way is to enable the VPN feature on your home router.
Now anyone can sign device firmware with MSI private keys. This represents a long-term persistent risk to be considered by all users.
It’s obvious already that AI needs regulating, but how? Here’s Eugene Kaspersky telling us how he sees it.
We examine the tale of Cinderella, one of the earliest stories that attempts to teach children basic cybersecurity principles.
The DMARC mechanism has its drawbacks, but we have developed a technology to fix them.
BEC attacks that use compromised mailboxes are especially dangerous. Here’s how we learned to identify them.
With deepfakes becoming more and more common — and more and more convincing — how can you protect your business?
We examine the workings of emotion-recognition technologies, their usefulness, and the privacy concerns they inspire.
Smart home systems, drones, AI — we discuss the new trends and technologies in the field of home security.
Emulator in Kaspersky Lab products: what is it and why it’s so important for antivirus to have one.
The story of patent US5490216, which struck terror in the hearts of IT professionals and cost a whole lot of tech companies hundreds of millions of dollars.
Any piece of malware can be captured if you know it for what it is — for example, if you use a trainable behavioral model.
How one of the key technologies behind the Kaspersky Lab’s antivirus engine came to be.
We created a new service that can provide a detailed dossier on any file Kaspersky Lab’s systems have encountered.
It’s not Malevich’s Black Square. This is what a screenshot taken by a suspicious application on a computer protected by Kaspersky Lab products looks like.
How to safeguard your solution and clients with time-tested technologies.