
Car Hacking Goes Mobile at Black Hat
Car hacking is back and Charlie Miller and Chris Valasek no longer have to plug their computers into the cars to make them do their bidding.
3278 articles
Car hacking is back and Charlie Miller and Chris Valasek no longer have to plug their computers into the cars to make them do their bidding.
Data breaches have become a routine. It can happen to any site, any day. You can’t prevent it, but there is a way to minimize the damage.
Despite the fact that we have cheap unlimited Internet connection almost everywhere, there are situations when each megabyte is literally worth its weight in gold.
Participate in Kaspersky Lab’s Global Think Test to test your brain power.
July is over and that means it’s time to look back and observe the latest results of the battle between cybercriminals and prosecutors.
In the news this week: more APT campaigns, a look forward at the DEF CON and Black Hat Hacker conferences, and good and bad news for Facebook.
In the news: Microsoft’s No-IP takedown fiasco, Chinese APT groups curious about U.S. Iraq policy, Verizon says the government wants locations data, and Microsoft denies backdoor insinuations.
Your iPhone runs hidden monitoring services. Who uses them, and for what purpose?
Facebook fails to fully encrypt data on its Instagram mobile app, which puts user security and privacy at risk.
School’s out for summer and the kids need watching. Here are some tools that can help you do the job – at least while they’re on the Internet.
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.co.uk/blog/tag/securityIS
If it is absolutely necessary that you check your email and the only way to do it is on a public computer, forward your email to a disposable email account like Mailinotor or Trashmail that has a short life and a timed expiration.
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.co.uk/blog/tag/securityIS
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.co.uk/blog/tag/securityIS
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.co.uk/blog/tag/securityIS
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.co.uk/blog/tag/securityIS
Know your sysadmin and what to expect from him. Don’t forget to congratulate the guy, today is Global Sysadmin day!
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.co.uk/blog/tag/securityIS
A new version of file-encrypting malware hides its sever inside an anonymous TOR network, making it safer for criminals to extort money from victims.