10 best quotes from Tim Cook’s recent speech on privacy and security
Recently, Apple’s CEO Tim Cook made a speech on privacy and security during EPIC’s Champions of Freedom event. We want to share with you 10 best quotes from this speech.
259 articles
Recently, Apple’s CEO Tim Cook made a speech on privacy and security during EPIC’s Champions of Freedom event. We want to share with you 10 best quotes from this speech.
Kaspersky Lab experts detected a shifty scheme that allows fraudsters steal personal data without your login and password.
We have worked together with child psychologists from across the globe to put together recommendations about how to support a victim of online bullying.
Ransomware is a kind of malware that steals users’ files and exacts a ransom from its victims. The most effective approach is to encrypt the files and offer decryption keys
Our own implementation of a cloud security model is called Kaspersky Security Network. And here we’ll explain how it actually works
A legendary Soviet spy, Richard Sorge, is famous for conveying the exact date of the German invasion into the Soviet Union, and for letting the command know Japan had no plans of attacking the USSR in the Far East.
Five lessons from the story of the Enigma cryptographic machine which are still relevant.
During WW2 modern cryptography principles were often coupled with ‘amateur’ ciphering methods. Curiously, the latter ones often proved to be equally reliable.
We’ve created an infographic that shows how the Kaspersky Lab flagship antivirus software has improved over the last 10 years.
Recent report by US GAO was treated by medias as “Modern aircrafts can be hacked and commandeered through onboard Wi-Fi”. Is it really that bad?
While surfing the Internet, children may come across web pages containing inappropriate infor-mation. IT solutions can help protect children from such content.
With so many games and apps available for download on your mobile devices, it’s important to remember that not all of them are suitable for children. That’s why you should be monitoring what your kid installs.
We need to learn from incidents, then implement much safer mechanisms to IoT systems that operated as parts of social/life infrastructures.
Children who use mobile devices can be even more vulnerable because they are free to surf the Internet at any time or place, without adult supervision.
Major social networks have been lately known to either unbundle their functionality into multiple apps, or buy other apps and not integrate their functionality into the main one
According to Nielsen’s year-old report on the state of mobile technology, users across multiple developed markets have one thing in common: they spend roughly 40% of their actual screen time
It’s always fun to observe commodity, non-vertically integrated tech manufacturers toss and twitch as distant rumours start rumbling about Apple entering yet another product category. Those companies don’t completely own
Do you know what your child is doing when s/he holding smartphone or tablet in his/her hands? Maybe everything is fine and s/he is just watching movies or playing game.
The latest privacy-related kerfuffle, involving Lenovo, who thought it was a great idea to pre-install some very nasty adware with gaping security holes, was like a blast from the past.
On February 19th of 2015, it came out that Lenovo’s laptops had been shipped with an adware Superfish preinstalled. There are two major problems with this issue. The first one is
Frequently we (and many, many others) write about different skimming techniques and other ways of compromising bank cards. Today, we’ll talk about the less apparent dangers that run the risk of