Facial recognition gets interesting — and useful
Catching criminals, waking up a sleepy driver, stopping teens from buying cigarettes — facial recognition can help us accomplish all that and more.
1198 articles
Catching criminals, waking up a sleepy driver, stopping teens from buying cigarettes — facial recognition can help us accomplish all that and more.
The changeover from magnetic stripe cards to chip cards cost millions of dollars but promised greater security. At Black Hat 2016, researchers told us that the new cards are nonetheless insecure.
Researchers discovered a hack that affects 100 million Volkswagen cars. And the equipment needed costs just $40.
Today, it seems everything can be hacked. Even your vibrator. This is the tale of developers of very intimate goods who do not value the privacy of their clients.
Up close and personal, one Kaspersky Labs editor’s experience with the system failure at Delta Air Lines.
A Dota 2 forum breach has leaked 2 million accounts. The consequences are meaningful.
Charlie Miller and Chris Valasek learned to hack a car’s steering wheel, brakes, and acceleration. They presented their finding at Black Hat USA 2016.
By now, you are no doubt familiar with short-term rental sites — AirBnB, Homeaway, and the like. Many of you reading this have used them, whether as guest or as
How concerned should we be with industrial security?
Kaspersky Lab has patented technology that can disarm Adobe Flash exploits using special detection technology.
You asked our GReAT members whatever you wanted. Here are the best 6 questions and GReAT experts’ answers
Facebook launched Aquila, a solar-powered drone which took its inaugural flight last week. Why does the social network need its own drones and how it is connected to the Google Loon project?
Online dating fraud cost victims millions last year. Be vigilant and protect yourself!
When Canada-based adultery site Ashley Madison was hacked, cybercriminals wasted no time in taking advantage of it. Even now, a year later, they continue to blackmail people and hold their data hostage. We look back at what happened then and talk about what’s happening now.
The threat landscape is ever changing, and our Global Research and Analysis Team (GReAT) is constantly looking at new attacks and finding ways to help protect the world from those
How to protect yourself from ransomware? Are there any cross-platform cryptors? How much time does it take to catch a cybercriminal? Jornt van der Wiel discusses all of that and more
As the Olympic Games in Rio draw nearer, cybercriminals are preparing more and more traps for sports fans. They make use of all kinds of tactics: phishing letters and fake
Ranscam deletes your files and then demands ransom to restore them, or it will delete them. Yes, in that order.
I remember when Pokémon came out on the Nintendo Gameboy. It was a challenging game that had my friends and me trying to catch all of the monsters. It was
This year, news of ransomware attacks have been coming in like dispatches from a battlefield — nonstop. Every day, researchers find new strains of ransomware and discover new and unconventional