
What is iPhone X Face ID and how secure is it?
How facial recognition works in the new Apple iPhone X —and is it secure enough for you to usetrust?
3964 articles
How facial recognition works in the new Apple iPhone X —and is it secure enough for you to usetrust?
Android users have the largest selection of mobile apps, but that means they are also exposed to the most threats. Avoid mobile malware by following some basic security rules.
Fraudsters make a fortune mining cryptocurrencies — on your computer, at your expense, and without your knowledge.
Transatlantic Cable Podcast episode 2: autonomous pizza delivery, Sarahah’s privacy issues, reprieve for victims of Yahoo!’s data breach and more.
Transatlantic Cable Podcast episode 2: autonomous pizza delivery, Sarahah’s privacy issues, reprieve for victims of Yahoo!’s data breach and more.
The Internet of Things is vulnerable like nothing else. What should you do to secure your smart home and other devices on the home network?
The global launch of our free antivirus utility has prompted a bunch of questions and resurrected a couple of ancient myths.
A story about a large malicious campaign carried out in Facebook Messenger — and how it worked.
This week’s Transatlantic Cable podcast features stories on Burger King, scams, Instagram security and more.
How mobile Trojans exploit WAP billing to steal money, and how to protect yourself.
Considering the modern threat landscape, the healthcare industry should pay more attention to cybersecurity
Alex Moiseev addresses the issue of transformations that happen when a business starts working with enterprises.
Modern technology actually helps phone scammers — what you need to know to stay safe.
What should you do if your antivirus detects something it calls “not-a-virus”? What kind of applications are behind this message, and what is all the fuss about?
Considering the modern threat landscape, the healthcare industry should pay more attention to cybersecurity
Everyone talks about the advantages of Bitcoin and blockchain, but we never seem to hear about their disadvantages. Perhaps now is the time.
Kaspersky Lab and Midori Kuma came to South Africa to educate children about the importance of online safety.
Android Trojans have been mimicking banking apps, messengers, and social apps for a while. Taxi-booking apps are next on the list.
The essence of the HuMachine concept is a fusion of big data, machine learning, and our analysts’ expertise. But what is behind these words?
Living online is more comfortable than ever — do you really still need a helmet?