The creepy side of big data
Just think of the sticky fingers of banks, marketers and insurers that hunt for your personal data with revolting impudence and store them unsecured. So, what’s the fuss about?
107 articles
Just think of the sticky fingers of banks, marketers and insurers that hunt for your personal data with revolting impudence and store them unsecured. So, what’s the fuss about?
Once more into a breach: 9.7 gigabytes of stolen data with users’ emails, credit card transactions and profiles leaked into the darknet.
The number of vulnerable Google devices reached an all-time high since worst Android flaws ever are uncovered. There are already patches available but they may never reach end users.
Security experts often mention exploits as one of the most serious problems, although it’s not always clear why exploits are so special and scary. We’ll try to explain here.
Cybercriminals know how to benefit from your mobile devices. Be vigilant and follow our recommendations to secure your smartphones and tablets.
Private data of 37 million users are at risk after a huge data breach on the popular Ashley Madison dating site.
Cybercriminals often pretend to be nice and amiable. Here are a few rules how not to become a victim of these malicious folks.
Want to slew a cybercriminal? Stay calm, be smart and check twice. Here is a list of security rules for every smart person who cares about cybersecurity.
Hackers and cyberspies are not something you only see at the cinema. The Internet is actually crawling with weirdoes and criminals who are just looking for a chance to infect your smartphone or steal your gaming account.
MRG Effitas awarded Kaspersky Lab its highest accolade for the development of reliable security technology for online banking.
Kaspersky Lab upgrades its flagship security solutions to 2016 versions
Why would cyber-criminals want to control your Facebook account? At the very least, they could “like” weird things and promote questionable goods and services on your behalf. However, Facebook is
Any system that is connected to the Internet is always subject to threats, no matter how well it is protected. This assumption is well-known to any teenager today. No software
Kaspersky Lab experts detected a shifty scheme that allows fraudsters steal personal data without your login and password.
We have worked together with child psychologists from across the globe to put together recommendations about how to support a victim of online bullying.
We’ve created an infographic that shows how the Kaspersky Lab flagship antivirus software has improved over the last 10 years.
While surfing the Internet, children may come across web pages containing inappropriate infor-mation. IT solutions can help protect children from such content.
Everybody knows about flying drones, but there also are swimming and diving drones that patrol ports and ships, demine shores and so on. Let’s take a closer look at maritime robots.
Big data helps to catch child abusers, drug dealers, and terrorists, and allegedly it has also helped to locate Bin Laden
Children who use mobile devices can be even more vulnerable because they are free to surf the Internet at any time or place, without adult supervision.
The 3Q and 4Q of 2014 were rather successful for Kaspersky Lab: our solutions became acknowledged winners of 11 independent tests (including long-term ones). Europe’s best selling computer magazine —