2014’s Top Private Data Leaks
Every year millions of people become victims of a data breach. For the majority, the results are the same: hackers sell users’ data on underground websites and companies have to rush
3078 articles
Every year millions of people become victims of a data breach. For the majority, the results are the same: hackers sell users’ data on underground websites and companies have to rush
Not surprisingly, one researcher realized last week that he could exploit Progressive’s Snapshot driver tracking tool in order to hack into the on-board networks of certain auto-mobiles. Snapshot is a
As a student, I had a little part time job of servicing and administrating computers for small businesses. Years have passed, but there are occasions when I have to remember
The new product of ours, Kaspersky Total Security, has just hit the shelves, and our customers have been bombarding us with questions ever since: “What are the key differences between
Gizmodo recently published a list of the most popular passwords of 2014, smugly deriding those morons who deploy poorly conceived credentials. Ironically, it may bear reminding that Gizmodo is owned
We all know to be aware of pickpockets. Even if it did not include tips on watching your pockets when outdoors, life itself provides opportunities to learn the simple rules.
Do you get enough sleep at night? Honestly, I don’t and neither do a lot of my friends. Whether it’s down to today’s hectic lifestyle or something more serious such
Blackhat, directed by Michael Mann (Heat, The Last of the Mohicans) is a digital whodunit about a pair of cyberattacks and the duo of unlikely bedfellows — a colonel on
“British Prime Minister David Cameron to ban encrypted messengers” — headlines like this one are all over the news at the moment, and with good reason. Opinions vary from “Let’s protect
The first ever publicly known Mac OS X firmware bootkit emerged out of the 31st Chaos Computer Club conference in Hamburg, Germany last month. Security researcher Trammel Hudson developed the
CES 2015 was a superb event in terms of new stuff per square foot, which has been referred to numerous times by tech website reporters. As for me, a person
The times when people used just a desktop computer for their work and leisure are long gone. In the last few years, there has seen an explosion in phones, tablets
Last year was an eventful one for the IT-security field. There were a lot of incidents, starting with global vulnerabilities to showdowns with local cybercriminals. So, as way of looking back we
Gaming is a multi-billion pound industry with millions of players across the globe. With this volume of users and money sloshing around, it’s inevitable that hackers and criminals come calling.
To some extent your connected PC or mobile device is a lonely warrior lost in unknown territory and this situation repeats each time you are online. In many cases your
Have you already bought all of your Christmas and New Year gifts, booked holiday tickets and hotel rooms? There’s a good chance that a good portion of those reading this
The Sony breach certainly seems to be the gift that keeps on giving this holiday season. And if the commonly accepted narrative reflects the truth, this whole nightmare scenario stems
Researchers at Kaspersky Lab have uncovered a new variant of the infamous Zeus Trojan. It’s called Chthonic, a reference to spirits or deities from the underworld in Greek myth, and
It was an enjoyable Saturday night, when a friend of mine suddenly received an SMS notification telling him that his card had been charged 550 EUR… in Greece. “What the…?”, was
Welcome to the second post in a series of blog posts regarding the false perception of IT- security. In this post we will describe some of the issues associated with
Technology evolves in a way that no one can predict or foresee. Accepting that fact, let us recall the geeky sci-fi fantasies from as far back as the 1960s, such