VPN implementations and their peculiarities
We have previously discussed what VPN is. Now let’s review its implementations and their advantages and drawbacks.
1132 articles
We have previously discussed what VPN is. Now let’s review its implementations and their advantages and drawbacks.
Find out how to make sure you’re keeping your Tumblr account as secure as possible.
Does your use of social media make you a liability to your company?
Triada is a modular mobile Trojan that actively uses root privileges to substitute system files and uses several clever methods to become almost invisible
We’ve reached an age where our digital and analog lives are one and the same. How can we make sure our kids grow up digitally savvy and safe?
A look at the evolution of mobile threats in 2015 and some predictions for 2016
Kaspersky Lab and partners reveal details of the joint investigation of the Lazarus group hazardous activity.
Shodan and Censys are the search engines for the Internet of Things and this duo is capable of wreaking havoc in a lot of different ways
The only way to ensure the security of online payments is to be at least one step ahead of the cyber-criminals, and that can be achieved only by improving the technology.
Over the past week or so, we have seen an escalation between Apple and the FBI in regards to unlocking the iPhone belonging to one of the shooters involved in
Acecard is one of the most advanced banking trojans. It’s capable of overlaying more than 30 banks’ and financial systems’ apps and is spread via Google Play.
It looks like Spotify accounts have been published on the Dark Web. It’s a good time to check up on your passwords.
Researchers expose how a criminal can hack air conditioners to crash the power grid.
According to AV-TEST, Kaspersky Lab solutions are the most efficient and reliable system watchdogs that require very few system resources.
What’s wrong with ATMs’ security and what should the banks do about it
Sooner or later each user of the internet will face a trick or trap. Here’s the list of the most widespread ones. Forewarned is forearmed!
The SAS 2016 has come and gone. Here’s a look back on the top 10 Tweets from the conference to relive the magic.
At SAS 2016 Sergey Lozhkin revealed how he hacked his friend’s hospital and medical equipment.
Observing cybercriminals’ behaviour one can find consistent patterns and thus find out who the criminal is in real life
At The SAS 2016, Kaspersky Lab researchers discussed the newly discovered Poseidon