Identity theft in 1915 | Kaspersky official blog
Credit to Author: Roman Dedenok| Date: Mon, 17 Jul 2023 13:29:00 +0000
Identity theft in the 1915 movie serial Les Vampires: MitM, bypassing 2FA, social engineering
Read moreCredit to Author: Roman Dedenok| Date: Mon, 17 Jul 2023 13:29:00 +0000
Identity theft in the 1915 movie serial Les Vampires: MitM, bypassing 2FA, social engineering
Read moreCredit to Author: Nikolay Pankov| Date: Thu, 04 May 2023 07:17:26 +0000
A look at cybersecurity issues in season 3 of The Mandalorian show.
Read moreCredit to Author: Nikolay Pankov| Date: Thu, 28 Jul 2022 12:09:46 +0000
We look at how supporters and opponents of the Empire handle cybersecurity in the series Obi-Wan Kenobi.
Read moreCredit to Author: Nikolay Pankov| Date: Wed, 26 Feb 2020 21:17:07 +0000
More confirmation that storytellers are infosec experts.
Read moreCredit to Author: Nikolay Pankov| Date: Sat, 04 Jan 2020 11:19:06 +0000
The Brothers Grimm fairy tales are deep source of object lessons in information security — not just for children, but also for adults.
Read moreCredit to Author: Nikolay Pankov| Date: Fri, 08 Nov 2019 15:56:41 +0000
In the latest Terminator movie, is Sarah Connor protected against cell-phone tracking?
Read moreCredit to Author: Nikolay Pankov| Date: Mon, 28 Oct 2019 14:56:47 +0000
Before the world release of Terminator: Dark Fate, we decided to check in on the state of cybersecurity in the Terminator universe.
Read moreCredit to Author: Nikolay Pankov| Date: Fri, 01 Mar 2019 17:27:16 +0000
Analysis of Sauron’s hacking tools implemented in the devices known as Rings of Power.
Read more