Five cyber spy technologies that cannot be stopped by going offline
Any system that is connected to the Internet is always subject to threats, no matter how well it is protected. This assumption is well-known to any teenager today. No software
3199 articles
Any system that is connected to the Internet is always subject to threats, no matter how well it is protected. This assumption is well-known to any teenager today. No software
Unwanted email has long stopped being just a means of advertising services of products. The long time it takes to erase all spam messages from your inbox is not the
What does a billionaire inventor, Google Now on Tap service and the recent “Ex Machina” movie have in common? Artificial intelligence.
Just ten days after remarkable Google I/O event Apple is holding it’s own developers conference. Let’s take a look on new security features.
Kaspersky Lab has discovered an advanced attack on its own internal network and is sharing its investigation results. TL;DR – Customers are safe; neither products nor services have been compromised.
Did you have a nice chat with your friends last time you met them? Or were you all only taking pictures of the meals for Instagram, and commenting each other on Facebook?
Kaspersky Lab researchers examined one city’s network of surveillance cameras and determined that the systems was not very secure.
Recently, Apple’s CEO Tim Cook made a speech on privacy and security during EPIC’s Champions of Freedom event. We want to share with you 10 best quotes from this speech.
Kaspersky Lab experts detected a shifty scheme that allows fraudsters steal personal data without your login and password.
We have worked together with child psychologists from across the globe to put together recommendations about how to support a victim of online bullying.
Tech journalists Chris Brook and Brian Donohue discuss Google I/O, the IRS and Carefirst BlueCross BlueShield Data Breach I this Talk Security podcast.
At Google I/O 2015 software giant have presented a whole bunch of new features and services. Let’s take a first look at customizable app permissions, Android Pay, Now on Tap and others.
Since the holiday season is upon us, we prepared a list of simple tips to help you minimize risks when renting a car abroad.
Virtual reality experiments have been continuously carried out since user PCs learned to process graphics. Step by step, the tech has become capable of creating virtual worlds that look relatively
While LTE networks are seemingly just now starting to take off and are not yet omnipresent, networking vendors and carriers are already fully engaged in a vivid discussion on 5G’s
Ransomware is a kind of malware that steals users’ files and exacts a ransom from its victims. The most effective approach is to encrypt the files and offer decryption keys
Much has been said about the VENOM vulnerability, the latest in an increasingly long line of bugs affecting vast swaths of the Internet. It’s an old-school bug of the relatively
The Chinese-language Naikon advanced persistent threat group is targeting military, government and civil organizations located in and around the South China Sea, which is an increasingly contentious hot-bed of territorial
Once you look as the airplanes moving on a map you get a feeling that it’s sheer Brownian motion. Of course, in reality, it’s not the case: aircrafts keep to air tracks all the time
Our own implementation of a cloud security model is called Kaspersky Security Network. And here we’ll explain how it actually works
Kaspersky Lab opens its new European Research Center in London