How big data and a bit of paranoia made Panama papers live
Journalists and their whistle-blowers managed to keep the biggest data leak in secret. How did they do it?
104 articles
Journalists and their whistle-blowers managed to keep the biggest data leak in secret. How did they do it?
Aleks Gostev of Kaspersky Lab’s GReAT discusses the WhatApp move towards encryption and how email needs to be next in adopting end-to-end encryption
WhatsApp has just adopted the end-to-end encryption based on Signal Protocol. Kaspersky Daily explains, why it’s the good news and what are the real benefits for all of us.
Categories: Featured, News, Security
We have previously discussed what VPN is. Now let’s review its implementations and their advantages and drawbacks.
Kaspersky Endpoint Security 10 can cipher not just one document, but entire archives and data storage media, both stationary and removable.
What exactly is a VPN? There has been a lot of buzz around it, but why do we need it?
SIM cards can be cloned. How is it possible and what does it have to do with cybercriminals?
Observing the evolution the good old SIM card went through and the results so far
Quantum computers are said to be coming soon. They will definitely change the information security paradigm. How you can prepare to this shift?
People encrypt their communications so strongly that governments cannot access it when there is a need. Is it really bad?
What is the Kaspersky Lab product is best for you? This post outlines the difference between KIS and KTS to help you choose which is better for you.
One of the most interesting ciphers designed to eliminate the vulnerability to symbol frequency analysis was the Vigenere cipher. Which later became the basis of unbreakable one-time pads.
Since Windows 10 arrived two days ago, new security-related concerns have surfaced. First and foremost, they’re about control over the data on Windows 10-based PCs and other devices.
At the recent Google I/O conference, the ‘corporation of good’ announced four projects: Soli, Jacquard, Vault, and Abacus. Let’s see what these curious techs are about.
The first technology to enable instant long-distance communication was the telegraph. Back in its time, the telegraph helped to shape many of the current IT infrastructures.
We’ve collected the most interesting books and movies which give a lot of detail on how exactly ciphers are solved.
Recently, Apple’s CEO Tim Cook delivered a speech on privacy and security during EPIC’s Champions of Freedom event. Here are the 10 best quotes from his speech.
A legendary Soviet spy, Richard Sorge, is famous for conveying the exact date of the German invasion into the Soviet Union, and for letting the command know Japan had no plans of attacking the USSR in the Far East.
Five lessons from the story of the Enigma cryptographic machine which are still relevant.