Side Eye: eavesdropping using a smartphone’s video camera
How and why did American researchers try to extract sound from a video signal, and was it worth it?
15 articles
How and why did American researchers try to extract sound from a video signal, and was it worth it?
Our kids will be astronauts, artists, or travelers — whatever they want, because the boring tasks will be performed by robots.
For a messaging app to be truly private, encryption is not enough. In this post we discuss the necessary features of private messaging.
Our bionic man, Evgeny Chereshnev, had a chance to speak at a TedX event in Kazan. During his 17-minute talk, he discussed what he has learned from having a biochip
How are criminals able to hack ATMs and get away with money? Here are four videos that show how ATMs can be vulnerable.
For the pilot of our “The daily life of…” series, we filmed David Jacoby — at home and out about town
Ryan Naraine and Juan Andrés Guerrero-Saade discuss the threat landscape and what is being done to pre-vent major attacks.
Check this out to know if you want to fall for one of the latest Facebook scams
Major social networks have been lately known to either unbundle their functionality into multiple apps, or buy other apps and not integrate their functionality into the main one
In this short video, we will explain six steps you can take to conveniently maximize the security of your PayPal account.
In 2014 we expect significant growth in the number of threats related to economic and domestic cyber-espionage, with cyber-mercenaries/cyber-detectives playing an active role in such attacks. The full report is
Meet Max, the IT Security Manager. See how Max, with the help of Kaspersky Lab, tackles the IT security battle in this new animation. Find out how IT security takes
The latest in Threatpost‘s ongoing How-To video series, we give tips and tricks on better securing the privacy of your Facebook account.
When it comes to online security, you need to be completely protected. You need hybrid protection, the combined power of the cloud and your PC. As great as cloud security