
The dark side of facial recognition technology
Lynch law, loss of basic privacy, disgusting marketing, digital identity theft — how else can facial recognition be misused?
1152 articles
Lynch law, loss of basic privacy, disgusting marketing, digital identity theft — how else can facial recognition be misused?
The changeover from magnetic stripe cards to chip cards cost millions of dollars but promised greater security. At Black Hat 2016, researchers told us that the new cards are nonetheless insecure.
Today, it seems everything can be hacked. Even your vibrator. This is the tale of developers of very intimate goods who do not value the privacy of their clients.
A Dota 2 forum breach has leaked 2 million accounts. The consequences are meaningful.
Charlie Miller and Chris Valasek learned to hack a car’s steering wheel, brakes, and acceleration. They presented their finding at Black Hat USA 2016.
How concerned should we be with industrial security?
Kaspersky Lab has patented technology that can disarm Adobe Flash exploits using special detection technology.
In the second part of our “Ask the expert” session, Jornt van der Wiel answers questions about encryption: how it works, what it is for, and more.
What is sextortion, and how can we protect ourselves and our children?
Now, a great number to attract your attention: $16.5 million. This is how much the jackpot was for a lottery ticket one man arranged to win.
Online dating fraud cost victims millions last year. Be vigilant and protect yourself!
Good news, everyone! We have help for victims of Shade ransomware. Now you can decrypt the data without paying ransom.
When Canada-based adultery site Ashley Madison was hacked, cybercriminals wasted no time in taking advantage of it. Even now, a year later, they continue to blackmail people and hold their data hostage. We look back at what happened then and talk about what’s happening now.
How to protect yourself from ransomware? Are there any cross-platform cryptors? How much time does it take to catch a cybercriminal? Jornt van der Wiel discusses all of that and more
Did you know that some apps on your iPhone or iPad track your location, access your camera and calendar, and more? In Part 1 of this story, we show you how to turn off tracking using iOS’s privacy features.
As the Olympic Games in Rio draw nearer, cybercriminals are preparing more and more traps for sports fans. They make use of all kinds of tactics: phishing letters and fake
Kaspersky Lab experts checked industrial control systems for vulnerabilities and found lots of them.
Ranscam deletes your files and then demands ransom to restore them, or it will delete them. Yes, in that order.
I remember when Pokémon came out on the Nintendo Gameboy. It was a challenging game that had my friends and me trying to catch all of the monsters. It was
This year, news of ransomware attacks have been coming in like dispatches from a battlefield — nonstop. Every day, researchers find new strains of ransomware and discover new and unconventional