
Are contactless payments safe?
A contactless bank card is a super-convenient thing. However, its ease of use would make you wonder whether stealing your money is equally easy.
3243 articles
A contactless bank card is a super-convenient thing. However, its ease of use would make you wonder whether stealing your money is equally easy.
What should you do if you use Kaspersky Lab products and you’re looking to upgrade your operating system to Windows 10?
Cybercriminals know how to benefit from your mobile devices. Be vigilant and follow our recommendations to secure your smartphones and tablets.
Ericsson and Qualcomm are promoting their new technology, LTE-U. Is it any better that LTE-A? And what is this combinations of letters supposed to mean, after all?
A bottle of good scotch in exchange for a day without a smartphone? Would I dare? That’s a piece of cake! That’s what I thought. As it turned out, it’s not that simple nowadays
Private data of 37 million users are at risk after a huge data breach on the popular Ashley Madison dating site.
Cybercriminals often pretend to be nice and amiable. Here are a few rules how not to become a victim of these malicious folks.
In the next 10 to 20 years UAVs, in one way or another, will become an integral part of our life, but will remain highly prone to vulnerabilities and security issues.
The TeslaCrypt ransomware family is notable for targeting games-related files, as well as the usual documents, pictures and so on. In the new version it became even more dangerous.
Want to slew a cybercriminal? Stay calm, be smart and check twice. Here is a list of security rules for every smart person who cares about cybersecurity.
Vitaly Kamluk answers our readers’ questions about malware counteraction and various security issues
Hackers and cyberspies are not something you only see at the cinema. The Internet is actually crawling with weirdoes and criminals who are just looking for a chance to infect your smartphone or steal your gaming account.
In the past, technologies that allow to see through walls were available only for some governmental services. Today, the situation changes owing to technological advancement that is followed by the price decrease.
MRG Effitas awarded Kaspersky Lab its highest accolade for the development of reliable security technology for online banking.
Kaspersky Lab upgrades its flagship security solutions to 2016 versions
Which brain mechanisms are in charge of our memory? Kaspersky Lab analyzed why we forget information stored on our devices.
Vitaly Kamluk has more than 10 years of work experience in IT security, and now he is Principal Security Researcher at Kaspersky Lab. He specializes in malware reverse engineering, computer
Vitaly Kamluk has more than 10 years of experience in IT security and now holds the title of Principal Security Researcher at Kaspersky Lab. He specializes in reverse engineering malware,
Why would cyber-criminals want to control your Facebook account? At the very least, they could “like” weird things and promote questionable goods and services on your behalf. However, Facebook is
At the recent Google I/O conference, the ‘corporation of good’ announced (besides new Android versions, new services and other predictable things), four new projects: Soli, Jacquard, Vault and Abacus. Let’s