
Drones and security: Where are we heading?
In the next 10 to 20 years UAVs, in one way or another, will become an integral part of our life, but will remain highly prone to vulnerabilities and security issues.
1141 articles
In the next 10 to 20 years UAVs, in one way or another, will become an integral part of our life, but will remain highly prone to vulnerabilities and security issues.
The TeslaCrypt ransomware family is notable for targeting games-related files, as well as the usual documents, pictures and so on. In the new version it became even more dangerous.
Vitaly Kamluk answers our readers’ questions about malware counteraction and various security issues
In the past, technologies that allow to see through walls were available only for some governmental services. Today, the situation changes owing to technological advancement that is followed by the price decrease.
MRG Effitas awarded Kaspersky Lab its highest accolade for the development of reliable security technology for online banking.
Vitaly Kamluk has more than 10 years of work experience in IT security, and now he is Principal Security Researcher at Kaspersky Lab. He specializes in malware reverse engineering, computer
Vitaly Kamluk has more than 10 years of experience in IT security and now holds the title of Principal Security Researcher at Kaspersky Lab. He specializes in reverse engineering malware,
At the recent Google I/O conference, the ‘corporation of good’ announced (besides new Android versions, new services and other predictable things), four new projects: Soli, Jacquard, Vault and Abacus. Let’s
I was repeatedly asked the question: “Once you decide to become a cyborg, how would your current routine change?” Today I’m going to give you 10 answers for this questions
Online password managers can make your life much easier by automatically entering individual passwords for each website and service you have an account for. It’s a convenient tool. That is,
Any system that is connected to the Internet is always subject to threats, no matter how well it is protected. This assumption is well-known to any teenager today. No software
Unwanted email has long stopped being just a means of advertising services of products. The long time it takes to erase all spam messages from your inbox is not the
What does a billionaire inventor, Google Now on Tap service and the recent “Ex Machina” movie have in common? Artificial intelligence.
Just ten days after remarkable Google I/O event Apple is holding it’s own developers conference. Let’s take a look on new security features.
Kaspersky Lab has discovered an advanced attack on its own internal network and is sharing its investigation results. TL;DR – Customers are safe; neither products nor services have been compromised.
Kaspersky Lab researchers examined one city’s network of surveillance cameras and determined that the systems was not very secure.
Kaspersky Lab experts detected a shifty scheme that allows fraudsters steal personal data without your login and password.
At Google I/O 2015 software giant have presented a whole bunch of new features and services. Let’s take a first look at customizable app permissions, Android Pay, Now on Tap and others.
While LTE networks are seemingly just now starting to take off and are not yet omnipresent, networking vendors and carriers are already fully engaged in a vivid discussion on 5G’s
Ransomware is a kind of malware that steals users’ files and exacts a ransom from its victims. The most effective approach is to encrypt the files and offer decryption keys
Much has been said about the VENOM vulnerability, the latest in an increasingly long line of bugs affecting vast swaths of the Internet. It’s an old-school bug of the relatively