How banking Trojans bypass two-factor authentication
Are you sure that one-time SMS passwords reliably protect your mobile bank? Think again! In this article we explain how Trojans fool two-factor authentication.
534 articles
Are you sure that one-time SMS passwords reliably protect your mobile bank? Think again! In this article we explain how Trojans fool two-factor authentication.
We have previously discussed what VPN is. Now let’s review its implementations and their advantages and drawbacks.
Find out how to make sure you’re keeping your Tumblr account as secure as possible.
A look at the evolution of mobile threats in 2015 and some predictions for 2016
Over the weekend, Snapchat was compromised via a phishing email pretending to be from company CEO.
While many mobile applications serve as a mere distraction, these apps can help simplify or streamline your daily life.
Shodan and Censys are the search engines for the Internet of Things and this duo is capable of wreaking havoc in a lot of different ways
The only way to ensure the security of online payments is to be at least one step ahead of the cyber-criminals, and that can be achieved only by improving the technology.
Over the past week or so, we have seen an escalation between Apple and the FBI in regards to unlocking the iPhone belonging to one of the shooters involved in
Sooner or later each user of the internet will face a trick or trap. Here’s the list of the most widespread ones. Forewarned is forearmed!
At SAS 2016 Sergey Lozhkin revealed how he hacked his friend’s hospital and medical equipment.
Observing cybercriminals’ behaviour one can find consistent patterns and thus find out who the criminal is in real life
Kaspersky Lab’s research shows that some users are too eager to share everything they have when it comes to social networks
The rise of Snapchat has brought a whole host of security issues regarding the app. Make sure your account is secure.
What exactly is a VPN? There has been a lot of buzz around it, but why do we need it?
Researcher shows that using data from motion sensors built into a smartwatch one can recognize numbers you press on a numerical pad. How can that affect your security?
How to resolve database update issues with your Kaspersky security solution.
Vendors claim, that a fingerprint sensor in your smartphone is user-friendly and really secure. But it’s not true.
SIM cards can be cloned. How is it possible and what does it have to do with cybercriminals?
Alexander Erofeev talks on who is the most interested in IT security knowledge, on life without technology and on predictions of the Internet existence.
At the Chaos Communication Congress a university professor tells how to forge keys using a 3D printer and we come up with a few tips how to protect yourself from that