According to statistics, 90% of startups, including those in the IT security sphere, are short of money to develop their project. An investor could become a source of financing, but before starting the search you need to narrow down your potential targets.
Android smartphones and tablets are very popular among students for several reasons. First, they are relatively affordable. Second, they are flexible, so users can choose the most suitable set-up for them. But there’s a catch. Google OS has limited in-built protection, so it’s up to the owner to enhance it.
Hi all! D.Z. – this is one of most distinguished and respected KLers, with us since last century (taking a brief creative break in the...
The RSA Conference 2015 is being held at the Moscone Center in San Francisco. It a massive event, with thousands of people in attendance.
The story of how Israeli UAVs defend the country on the ground, in the sky, and in the information domain.
Yet another Duke APT is hitting high-profile targets, including the US government office. This time it’s CozyDuke (also known as CozyBear, CozyCar or “Office Monkeys”,...
Cisco published an analysis of TeslaCrypt and a decryptor tool that recovers files lost to the ransomware.