How easy is it for hackers to steal your face?
Cybercriminals hunt for data of all kinds: personal details, photos, videos and even ways that users interact with others; this data is often stolen from social networks. Stolen data is
75 articles
Cybercriminals hunt for data of all kinds: personal details, photos, videos and even ways that users interact with others; this data is often stolen from social networks. Stolen data is
Many would think that the root of all the cyber-evil is tech itself, and once you say no to fancy smart devices, all those spooky cyber-threats should go away. If
Tips and methods of hacking global surveillance: makeup, special clothes, eyeglasses and more.
Headlines raise alarm: the greatest hack in history finally reached iOS. Is that really so and who are the potential victims?
“The Girl in the Spider’s Web”, the 4th book of Millenium series released today. Our security expert David Jacoby tells how he consulted the author of the book on what exactly hacking is.
Once more into a breach: 9.7 gigabytes of stolen data with users’ emails, credit card transactions and profiles leaked into the darknet.
Since there’s nothing unhackable in this world, why should chemical plants should be the exception?
Researchers compete at finding security holes in infotainment systems of connected cars and breaking in. The new case proves that Tesla does care a lot about security at wheel.
Security researcher Chris Rock discovered, that it’s very easy to kill a human. All you need is just a computer with Internet access, some knowledge and common sense.
Recently we wrote about the Jeep Cherokee hack incident. At Black Hat security researchers Charlie Miller and Chris Valasek finally explained, how exactly the now-famous Jeep hack happened.
Private data of 37 million users are at risk after a huge data breach on the popular Ashley Madison dating site.
Vitaly Kamluk has more than 10 years of experience in IT security and now holds the title of Principal Security Researcher at Kaspersky Lab. He specializes in reverse engineering malware,
Why would cyber-criminals want to control your Facebook account? At the very least, they could “like” weird things and promote questionable goods and services on your behalf. However, Facebook is
Online password managers can make your life much easier by automatically entering individual passwords for each website and service you have an account for. It’s a convenient tool. That is,
Kaspersky Lab has discovered an advanced attack on its own internal network and is sharing its investigation results. TL;DR – Customers are safe; neither products nor services have been compromised.
Big data helps to catch child abusers, drug dealers, and terrorists, and allegedly it has also helped to locate Bin Laden
Editorial note: Sergey Dolya, the author of this post is one of the most popular Russian bloggers. This story has happened recently with one of his friends. As it turned
Every year millions of people become victims of a data breach. For the majority, the results are the same: hackers sell users’ data on underground websites and companies have to rush
Not surprisingly, one researcher realized last week that he could exploit Progressive’s Snapshot driver tracking tool in order to hack into the on-board networks of certain auto-mobiles. Snapshot is a
To some extent your connected PC or mobile device is a lonely warrior lost in unknown territory and this situation repeats each time you are online. In many cases your
The Sony breach certainly seems to be the gift that keeps on giving this holiday season. And if the commonly accepted narrative reflects the truth, this whole nightmare scenario stems