
Never post tickets with barcodes online!
One Instagram post with a picture of a ticket can cost you a whole lot of time and money and ruin your day. This is how you can avoid it
1154 articles
One Instagram post with a picture of a ticket can cost you a whole lot of time and money and ruin your day. This is how you can avoid it
Another piece of ransomware bites the dust: Kaspersky Lab now offers a free decryption tool for the WildFire cryptor.
Lynch law, loss of basic privacy, disgusting marketing, digital identity theft — how else can facial recognition be misused?
The changeover from magnetic stripe cards to chip cards cost millions of dollars but promised greater security. At Black Hat 2016, researchers told us that the new cards are nonetheless insecure.
Today, it seems everything can be hacked. Even your vibrator. This is the tale of developers of very intimate goods who do not value the privacy of their clients.
A Dota 2 forum breach has leaked 2 million accounts. The consequences are meaningful.
Charlie Miller and Chris Valasek learned to hack a car’s steering wheel, brakes, and acceleration. They presented their finding at Black Hat USA 2016.
How concerned should we be with industrial security?
Kaspersky Lab has patented technology that can disarm Adobe Flash exploits using special detection technology.
In the second part of our “Ask the expert” session, Jornt van der Wiel answers questions about encryption: how it works, what it is for, and more.
What is sextortion, and how can we protect ourselves and our children?
Now, a great number to attract your attention: $16.5 million. This is how much the jackpot was for a lottery ticket one man arranged to win.
Online dating fraud cost victims millions last year. Be vigilant and protect yourself!
Good news, everyone! We have help for victims of Shade ransomware. Now you can decrypt the data without paying ransom.
When Canada-based adultery site Ashley Madison was hacked, cybercriminals wasted no time in taking advantage of it. Even now, a year later, they continue to blackmail people and hold their data hostage. We look back at what happened then and talk about what’s happening now.
How to protect yourself from ransomware? Are there any cross-platform cryptors? How much time does it take to catch a cybercriminal? Jornt van der Wiel discusses all of that and more
Did you know that some apps on your iPhone or iPad track your location, access your camera and calendar, and more? In Part 1 of this story, we show you how to turn off tracking using iOS’s privacy features.
As the Olympic Games in Rio draw nearer, cybercriminals are preparing more and more traps for sports fans. They make use of all kinds of tactics: phishing letters and fake
Kaspersky Lab experts checked industrial control systems for vulnerabilities and found lots of them.
Ranscam deletes your files and then demands ransom to restore them, or it will delete them. Yes, in that order.