Security Week 41: research censored, Outlook Web Access hacked, subscriber data lost
In this edition of Security Week infosec digest we’ll cover threecases of companies being hacked and data being leaked and companies reacting on the incidents.
1131 articles
In this edition of Security Week infosec digest we’ll cover threecases of companies being hacked and data being leaked and companies reacting on the incidents.
Tips and methods of hacking global surveillance: makeup, special clothes, eyeglasses and more.
I wonder what will happen when there are no more infosec problems. Will our Threatpost news blog convert to a digest of kitty cats? Is this bright future feasible at
Today’s smartphones are full-fledged computers much more powerful than the desktops you used 10 years ago. Your device is very likely to contain data the cybercriminals are after, like banking data.
Today’s weekly news digest covers the stories about various mistakes in coding, and how they can be used for different purposes, including earning money.
Our today’s weekly news digest covers three stories about the mistakes coders make when programming robots, the way other people exploit those design flaws, and then the reckoning.
Cyber-literate users possesses a variety of good habits, which protect them online and offline. What are these traits?
Facial recognition algorithms can track your movements with amazing accuracy. But if you know how they work you can trick them.
Kaspersky Lab joined hands with the Dutch police to arrest the criminals behind the CoinVault dangerous ransomware.
A virus damaging hardware is one of the most widely believed myths in the infosec domain. And, at the same time, it’s the most non-standard one. And it’s not totally a myth, after all.
In the new installment of our explosive hit series “Infosec news” you’ll find: the breach of Bugzilla, Carbanak is coming back and Turla uses Level-God hard to track techniques to hide servers.
One of the most interesting ciphers designed to eliminate the vulnerability to symbol frequency analysis was the Vigenere cipher. Which later became the basis of unbreakable one-time pads.
Kaspersky Lab’s researchers have found that Russian-speaking Turla APT group is exploiting satellites to mask its operation ant to hide command-and-control servers
The new trend on IFA 2015 is all about integrity and security. Meet Kaspersky Lab’s observations from the trade show.
Information security digest: the greatest iOS theft, farewell to RC4 cipher, multiple vulnerabilities in routers
Headlines raise alarm: the greatest hack in history finally reached iOS. Is that really so and who are the potential victims?
They teach a lot of things in schools, but they never tell you how to be safe in Internet. We have several simple advices on cybersecurity for you, that will help you stay away from trouble.
Infosec digest: exploit kit Neutrino in Wordpress, yet another GitHub DDoS, Wyndham responsible for breach, while Target is not
A year ago, an infamous leak which exposed some celebrities’ nude photos sparked the discussion around password safety. What can you do protect your accounts?
“The Girl in the Spider’s Web”, the 4th book of Millenium series released today. Our security expert David Jacoby tells how he consulted the author of the book on what exactly hacking is.
One can find a number of reasons why this very bug cannot be patched right now, or this quarter, or, like, ever. Yet, the problem has to be solved.