Quantcast
Channel: Technology – Kaspersky official blog
Browsing all 63 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Voice assistants hear things we don’t

Our interaction with technology could soon be predominantly voice-based. To ask for something out loud and hear the answer is literally child’s play: Just take a look at how effortlessly kids use voice...

View Article



Image may be NSFW.
Clik here to view.

When Artificial Intelligence affects lives

Despite our previous coverage of some major issues with AI in its current form, people still entrust very important matters to robot assistants. Self-learning systems are already helping judges and...

View Article

Image may be NSFW.
Clik here to view.

Is it possible to guard against GPS attacks?

Driving downtown, you glance at your navigation app and see that it thinks that you are at the airport. A bit unsettling, no doubt. This is not a made-up situation; it’s a real example of GPS spoofing...

View Article

Image may be NSFW.
Clik here to view.

Our new emulator technology: real crafty malware’s worst nightmare.

Have you ever wondered why computer viruses are called just that – ‘viruses’? Well, actually, today the word viruses is used somewhat misleadingly to refer to most ‘any type of malicious program, or is...

View Article

Image may be NSFW.
Clik here to view.

Earth 2050: Visions of the future, today

Originally published in Eugene Kaspersky’s blog You may have already heard about the big change at our company last week. However, big changes are nothing new to us! Ever since we began 22 years ago,...

View Article


Image may be NSFW.
Clik here to view.

Sign In with Apple — quick login for privacy geeks

At its Worldwide Developer Conference earlier this June, Apple presented its new authentication system, Sign In with Apple, which lets users create new website and app accounts using their Apple ID....

View Article

Image may be NSFW.
Clik here to view.

What is digital steganography?

We all know what it means to “read between the lines” in a figurative sense, but before we used modern technology to communicate with one another, people sometimes took it literally, such as by writing...

View Article

Image may be NSFW.
Clik here to view.

Smart home hacks

Smart home technologies are designed to make life easier and more convenient. However, new conveniences also mean new problems. The dangers of automating anything and everything are a frequent topic of...

View Article


Image may be NSFW.
Clik here to view.

My home is my castle: Security technologies for the house

Your home is your own private island of tranquility where you can rest easy — if it’s secure, that is. If not, then one not-so-fine day it could turn into a public place. With that in mind, we compiled...

View Article


Image may be NSFW.
Clik here to view.

Internet in space: Is there Net on Mars?

By now, the Internet has reached basically all corners of the Earth — and not just its surface. Being online onboard an airplane is already old hat, and even the International Space Station has a...

View Article

Sense and sensibility: Do we want AI to master emotions?

Imagine you come home one day in a bad mood, shout at the door for not opening fast enough and at the light bulb because it burned out — and the smart speaker immediately starts playing chill music,...

View Article

The curious vulnerabilities of ordinary MEMS

Digital devices now have “sense organs” to help them interact with the physical world. On the one hand, that’s awfully convenient for users. But on the other hand, it creates new threats, and they’re...

View Article

Faking fingerprints — doable, but hard

For years, the security of fingerprint-based authorization has been a topic of fierce debate. Back in 2013, shortly after the release of the iPhone 5S with TouchID, researchers showed the technology...

View Article


Quantum computers 101

Last fall, Google announced that it had achieved quantum supremacy. If that sounds a bit abstract and not relevant to the average user, think again. What the Google team did, essentially, was use a...

View Article

Image may be NSFW.
Clik here to view.

How to keep track of little ones on the loose

With some kids, it takes just a few seconds of distraction while the whole family is at the mall. If your child pops out of view, they’ll usually be right back in just as few blinks of the eye. You...

View Article


Zoom 5 moves toward security

Not so long ago, we explained how to configure Zoom to make it safer to use. However, technologies can develop very rapidly, especially those in the spotlight. One such case is Zoom, whose developers...

View Article

What are App Clips and Instant Apps?

A few days ago, at its worldwide developer conference (WWDC 2020, held in full virtual mode because of the coronavirus outbreak), Apple unveiled the next version of iOS. One of its innovations is App...

View Article


Quantum computers and cryptography for dummies

Quantum computers are capable of very quickly solving very complex problems, such that even a supercomputer would be stumped for a long time. True, most of these problems are currently somewhat removed...

View Article

Lamphone: A new kind of “visual eavesdropping”

Not so long ago, we wrote about methods that Mordechai Guri and his colleagues at Ben-Gurion University devised to extract information from a device that is not only not connected to the Internet, but...

View Article

Image may be NSFW.
Clik here to view.

SpiKey: Eavesdropping on keys

A lock is reliable only insofar as it cannot be defeated by an intruder. Computer technology makes things easier, alas, including for those who hate doors they cannot open (and no, we are not talking...

View Article
Browsing all 63 articles
Browse latest View live




Latest Images