Artificial intelligence safety, or When to expect SkyNet?
What do a billionaire inventor Elon Musk, the Google Now on Tap service, and the recent “Ex Machina” movie have in common? They all are about artificial intelligence.
1433 articles
What do a billionaire inventor Elon Musk, the Google Now on Tap service, and the recent “Ex Machina” movie have in common? They all are about artificial intelligence.
Kaspersky Lab has discovered an advanced attack on its own internal network and is sharing its investigation results. TL;DR – Customers are safe; neither products nor services have been compromised.
Just ten days after the remarkable Google I/O event, Apple is holding its own developers conference. Let’s take a look at the new security features.
We’ve collected the most interesting books and movies which give a lot of detail on how exactly ciphers are solved.
Kaspersky Lab researchers examined one city’s network of surveillance cameras and determined that the systems were not very secure.
Recently, Apple’s CEO Tim Cook delivered a speech on privacy and security during EPIC’s Champions of Freedom event. Here are the 10 best quotes from his speech.
Kaspersky Lab experts detected a sly scheme that allows fraudsters to steal personal data without your login and password.
Tech journalists Chris Brook and Brian Donohue discuss Google I/O, the IRS and Carefirst BlueCross BlueShield Data Breach in this Talk Security podcast.
At Google I/O 2015, the software giant presented a slew of new features and services. We take a first look at customizable app permissions, Android Pay, Now on Tap, and others.
I gather our readers have already heard about some controversial Google Glass experiences. Now, it is time to discuss the response by Microsoft, HoloLens augmented reality system.
While LTE networks are seemingly just now starting to take off, networking vendors and carriers are already fully engaged in a vivid discussion on 5G’s perspectives. What are those next-gen networks going to be and why do we need them at all?
To hackers’ delight, merchant vessels that transfer about ninety percent of the world’s cargo heavily depend on automation and remote monitoring systems with poor IT security.
Much has been said about the VENOM vulnerability, which is part of the new-age phenomena of Virtualization.
A new, Chinese-language APT has emerged, seeking geopolitical information and targeting nations in and around the South China Sea
When you look at airplanes moving on a map, you get the feeling it’s sheer Brownian motion. Of course, that’s not the case: aircrafts keep to air tracks all the time.
Using a biochip, Microsoft Kinect, a servo, and a bit of IT magic, we are going to make the imaginary idea of Jedi Force come to life in the real world!
Our personal implementation of the cloud security model is called Kaspersky Security Network. And here we’ll explain how it actually works.
How many research centers do you need to fight for a safer cyber world? We used to have three labs based in Moscow, Beijing, and Seattle. Now, we’re excited to announce the opening of a fourth lab — our new European Research Center based in London.
It was recently discovered that certain Hospira drug infusion pumps contain dangerous and easily exploitable security vulnerabilities.
A legendary Soviet spy, Richard Sorge, is famous for conveying the exact date of the German invasion into the Soviet Union, and for letting the command know Japan had no plans of attacking the USSR in the Far East.
Five lessons from the story of the Enigma cryptographic machine which are still relevant.