![Human trafficking: big data turned you and me into goods for sales](https://media.kasperskydaily.com/wp-content/uploads/sites/92/2016/04/06022424/big_data_sells_people-featured-700x459.jpg)
Human trafficking: big data turned you and me into goods for sales
How everyone and his dog online make the big data tyranny raise.
149 articles
How everyone and his dog online make the big data tyranny raise.
VPN’s features and pitfalls from legal and technical standpoint
Big data is amazing for sure, but as any other tech, especially emerging one, it has issues. Let’s take a look what could possibly go wrong with big data implementations.
Apple SIM, Google Project Fi and, for example, GigSky are all virtual SIM cards. OK, what’s so virtual about them?
We have previously discussed what VPN is. Now let’s review its implementations and their advantages and drawbacks.
The next step in SIM cards evolution is not about squeezing them into even more miniscule form factor, it’s about replacing them at all — with a profile stored in connected device.
Our bionic man Evgeny Chereshnev talks on the biochip in his hand and how it makes you a part of the Internet of Things
What exactly is a VPN? There has been a lot of buzz around it, but why do we need it?
Vendors claim, that a fingerprint sensor in your smartphone is user-friendly and really secure. But it’s not true.
Observing the evolution the good old SIM card went through and the results so far
Quantum computers are said to be coming soon. They will definitely change the information security paradigm. How you can prepare to this shift?
People encrypt their communications so strongly that governments cannot access it when there is a need. Is it really bad?
Cellular networks are not that hard to hack and it is almost impossible to protect them. Telcos are not ready to take responsibility and spend millions of dollars to secure their clients.
Popular online messengers cannot be considered secure enough, yet people continue to use them to exchange private and critical information.
Criminals can use VoLTE to cause connection failure, subdue voice calls, or strip the victim’s mobile account of money.
Fingerprints and iris scans are insecure and can be stolen to compromise your identity.
Tips and methods of hacking global surveillance: makeup, special clothes, eyeglasses and more.
Just think of the sticky fingers of banks, marketers and insurers that hunt for your personal data with revolting impudence and store them unsecured. So, what’s the fuss about?
A contactless bank card is a super-convenient thing. However, its ease of use would make you wonder whether stealing your money is equally easy.
Ericsson and Qualcomm are promoting their new technology, LTE-U. Is it any better that LTE-A? And what is this combinations of letters supposed to mean, after all?