
Security do’s and don’ts: Keeping weirdos aside
Cybercriminals often pretend to be nice and amiable. Here are a few rules how not to become a victim of these malicious folks.
3279 articles
Cybercriminals often pretend to be nice and amiable. Here are a few rules how not to become a victim of these malicious folks.
In the next 10 to 20 years UAVs, in one way or another, will become an integral part of our life, but will remain highly prone to vulnerabilities and security issues.
The TeslaCrypt ransomware family is notable for targeting games-related files, as well as the usual documents, pictures and so on. In the new version it became even more dangerous.
Want to slew a cybercriminal? Stay calm, be smart and check twice. Here is a list of security rules for every smart person who cares about cybersecurity.
Vitaly Kamluk answers our readers’ questions about malware counteraction and various security issues
Hackers and cyberspies are not something you only see at the cinema. The Internet is actually crawling with weirdoes and criminals who are just looking for a chance to infect your smartphone or steal your gaming account.
In the past, technologies that allow to see through walls were available only for some governmental services. Today, the situation changes owing to technological advancement that is followed by the price decrease.
MRG Effitas awarded Kaspersky Lab its highest accolade for the development of reliable security technology for online banking.
Kaspersky Lab upgrades its flagship security solutions to 2016 versions
Which brain mechanisms are in charge of our memory? Kaspersky Lab analyzed why we forget information stored on our devices.
Vitaly Kamluk has more than 10 years of work experience in IT security, and now he is Principal Security Researcher at Kaspersky Lab. He specializes in malware reverse engineering, computer
Vitaly Kamluk has more than 10 years of experience in IT security and now holds the title of Principal Security Researcher at Kaspersky Lab. He specializes in reverse engineering malware,
Why would cyber-criminals want to control your Facebook account? At the very least, they could “like” weird things and promote questionable goods and services on your behalf. However, Facebook is
At the recent Google I/O conference, the ‘corporation of good’ announced (besides new Android versions, new services and other predictable things), four new projects: Soli, Jacquard, Vault and Abacus. Let’s
I was repeatedly asked the question: “Once you decide to become a cyborg, how would your current routine change?” Today I’m going to give you 10 answers for this questions
Online password managers can make your life much easier by automatically entering individual passwords for each website and service you have an account for. It’s a convenient tool. That is,
Any system that is connected to the Internet is always subject to threats, no matter how well it is protected. This assumption is well-known to any teenager today. No software
Unwanted email has long stopped being just a means of advertising services of products. The long time it takes to erase all spam messages from your inbox is not the
What does a billionaire inventor, Google Now on Tap service and the recent “Ex Machina” movie have in common? Artificial intelligence.
Just ten days after remarkable Google I/O event Apple is holding it’s own developers conference. Let’s take a look on new security features.