
Five cyber spy technologies that cannot be stopped by going offline
Any system that is connected to the Internet is always subject to threats, no matter how well it is protected. This assumption is well-known to any teenager today. No software
560 articles
Any system that is connected to the Internet is always subject to threats, no matter how well it is protected. This assumption is well-known to any teenager today. No software
What does a billionaire inventor, Google Now on Tap service and the recent “Ex Machina” movie have in common? Artificial intelligence.
Just ten days after remarkable Google I/O event Apple is holding it’s own developers conference. Let’s take a look on new security features.
Kaspersky Lab researchers examined one city’s network of surveillance cameras and determined that the systems was not very secure.
Recently, Apple’s CEO Tim Cook made a speech on privacy and security during EPIC’s Champions of Freedom event. We want to share with you 10 best quotes from this speech.
Kaspersky Lab experts detected a shifty scheme that allows fraudsters steal personal data without your login and password.
At Google I/O 2015 software giant have presented a whole bunch of new features and services. Let’s take a first look at customizable app permissions, Android Pay, Now on Tap and others.
Since the holiday season is upon us, we prepared a list of simple tips to help you minimize risks when renting a car abroad.
While LTE networks are seemingly just now starting to take off and are not yet omnipresent, networking vendors and carriers are already fully engaged in a vivid discussion on 5G’s
Much has been said about the VENOM vulnerability, the latest in an increasingly long line of bugs affecting vast swaths of the Internet. It’s an old-school bug of the relatively
Kaspersky Lab opens its new European Research Center in London
A legendary Soviet spy, Richard Sorge, is famous for conveying the exact date of the German invasion into the Soviet Union, and for letting the command know Japan had no plans of attacking the USSR in the Far East.
Five lessons from the story of the Enigma cryptographic machine which are still relevant.
During WW2 modern cryptography principles were often coupled with ‘amateur’ ciphering methods. Curiously, the latter ones often proved to be equally reliable.
CozyDuke APT is hitting high-profile targets, including the US government office. Initial penetration method is based entirely on social engineering techniques.
The story of how Israeli UAVs defend the country on the ground, in the sky and in the information domain.
The annual RSA Conference in San Francisco, California of Internet-of-things insecurity and how no amount of money can fix computer security.
Everybody knows about flying drones, but there also are swimming and diving drones that patrol ports and ships, demine shores and so on. Let’s take a closer look at maritime robots.
Big data helps to catch child abusers, drug dealers, and terrorists, and allegedly it has also helped to locate Bin Laden
Recently Interpol, Microsoft and Kaspersky Lab revealed and shut down a huge botnet which zombified about 770,000 of PCs worldwide. Check this story out and then check your PC.
We need to learn from incidents, then implement much safer mechanisms to IoT systems that operated as parts of social/life infrastructures.