105 articles
Apple SIM, Google Project Fi and, for example, GigSky are all virtual SIM cards. OK, what’s so virtual about them?
A 3D printer can print paws for dogs, beaks for toucans and jaws for turtles. And yes, it saves their lives.
SIM cards can be cloned. How is it possible and what does it have to do with cybercriminals?
Alexander Erofeev talks on who is the most interested in IT security knowledge, on life without technology and on predictions of the Internet existence.
Observing the evolution the good old SIM card went through and the results so far
In Back to the Future 2, Marty McFly and co. come to 2015. Let’s see, which forecasts of this legendary saga are true and which are false.
Ericsson and Qualcomm are promoting their new technology, LTE-U. Is it any better that LTE-A? And what is this combinations of letters supposed to mean, after all?
In next 10-20 years UAVs, in one or another manner, will become an integral part of our life, but still remain highly prone to vulnerabilities and security issues.
MRG Effitas awarded Kaspersky Lab its highest accolade for the development of reliable security technology for online banking.
I gather our readers have already heard about some controversial Google Glass experiences. Now, it is time to discuss the response by Microsoft, HoloLens augmented reality system.
Let’s imagine the things we would have to leave behind as a brand new world of driverless cars is evolving at a full speed (besides the enjoyment of driving itself)
There have long been rumors in the InfoSec community that in the wake of recent revelations, foreign institutions embraced old-school means of keeping their secrets safe. Namely, once again embracing the typewriter. This is actually like betting on horse carriages at the dawn of the auto industry – sort of denying the future.
High-tech crime sounds impressive, but actually the tools are the only somewhat high-tech part, the goals almost never are.
Any new technology can be rough around the edges. The consequences can be complex and there’s high chance for human error, especially when it comes to security.
The Ferrari plant in Maranello, Italy, is a smart blend of the latest technology and centuries-old skills of craftsmanship. Ferrari is the producer of the best cars in the world, and to stay ahead they often employ newer technologies that later become a major trend elsewhere.
Bullying isn’t new, of course. But technology has made it easier than ever before for bullies to attack the vulnerable. If you’re a parent, take a look at our checklist of top tips for keeping your children safe from cyberbullying.
A very serious flaw has just been discovered in OpenSSL – an open-source and very popular cryptographic library, which has already incited a minor (for now) panic amongst security experts.
Bitcoin is a cryptocurrency that owes much of its popularity to its rather volatile — and occasionally very high — price. Its potential for investors has made it a tempting
Nowadays, quantum systems really do exist, with some of them reaching the stage of commercial sales. Quantum computers raise and answer new questions in the security field.
The Mobile World Congress, which is currently under way in Barcelona, is the world’s premier telecoms industry event. It’s the place where the most important announcements are made on issues