I’m done with remembering passwords
How Twitter’s “not-a-leak” made me realize that remembering passwords no longer works.
0 articles
How Twitter’s “not-a-leak” made me realize that remembering passwords no longer works.
What is a cryptocurrency wallet, and how do you choose which one suits you best?
Almost every new smartphone now lets you unlock it with your face — and that’s really bad for security.
Two new fingerprint-scanning technologies revealed at Mobile World Congress 2018 use different approaches.
At MWC 2018, Kaspersky Lab researchers show how easily a smart home can be hacked.
Browser extensions are handy, but they can also be really dangerous. Here’s what can go wrong and what you can do about it.
What miners and Web miners are, why you need to protect yourself, and how Kaspersky Lab products can assist
Can’t resist the convenience of free Wi-Fi? Here’s a way to make it secure.
A representative of the US Department of Homeland Security claims that he hacked into a Boeing 757.
POST IS BEING UPDATED LIVE. The world is being hit with yet another ransomware epidemic. It’s called Bad Rabbit, and here’s what we know about it so far.
Every Wi-Fi network using WPA or WPA2 encryption is vulnerable to a key reinstallation attack. Here are some more details and means of protection.
How facial recognition works in the new Apple iPhone X — is it secure enough for you to trust?
What should you do if your antivirus detects something it calls “not-a-virus”? What kind of applications are behind this message, and what is all the fuss about?
Adware found on 250 million computers spies on users and can install other software.
How a couple of simple permissions let an application steal passwords, log user actions, and do many other nasty things.
How messages with confirmation codes from banks are intercepted and what can you do to protect yourself.
Drones are a part of the Internet of Things, which is widely known to be vulnerable. SEO title: How to hijack a drone
Popular online messengers cannot be considered secure enough, yet people continue to use them to exchange private and critical information.
Criminals can use VoLTE to cause connection failure, subdue voice calls, or strip the victim’s mobile account of money.
Many would think that the root of all the cyber-evil is tech itself, and once you say no to fancy smart devices, all those spooky cyber-threats should go away. If