
Cinderella and the signature-based detection
We examine the tale of Cinderella, one of the earliest stories that attempts to teach children basic cybersecurity principles.
24 articles
We examine the tale of Cinderella, one of the earliest stories that attempts to teach children basic cybersecurity principles.
The DMARC mechanism has its drawbacks, but we have developed a technology to fix them.
BEC attacks that use compromised mailboxes are especially dangerous. Here’s how we learned to identify them.
With deepfakes becoming more and more common — and more and more convincing — how can you protect your business?
We examine the workings of emotion-recognition technologies, their usefulness, and the privacy concerns they inspire.
Smart home systems, drones, AI — we discuss the new trends and technologies in the field of home security.
Emulator in Kaspersky Lab products: what is it and why it’s so important for antivirus to have one.
The story of patent US5490216, which struck terror in the hearts of IT professionals and cost a whole lot of tech companies hundreds of millions of dollars.
Any piece of malware can be captured if you know it for what it is — for example, if you use a trainable behavioral model.
How one of the key technologies behind the Kaspersky Lab’s antivirus engine came to be.
We created a new service that can provide a detailed dossier on any file Kaspersky Lab’s systems have encountered.
It’s not Malevich’s Black Square. This is what a screenshot taken by a suspicious application on a computer protected by Kaspersky Lab products looks like.
How to safeguard your solution and clients with time-tested technologies.
Researchers investigate how vulnerabilities in robots can be exploited to take control of them.
We’re hosting an online workshop at the European Information Security Summit 2018 to help businesses get their networks prepared for new and emerging threats.
The cryptomining boom is helping scammers make money out of thin air. The latest method involves fake currency and ransomware.
Who is mining cryptocurrency such as bitcoins — and where have all the graphics cards gone?
Kaspersky Internet Security prevents eavesdropping through a computer microphone. Here’s how it works.
Confused and wondering how Bitcoin and blockchain work? In this post we break it all down for you.
Catching criminals, waking up a sleepy driver, stopping teens from buying cigarettes — facial recognition can help us accomplish all that and more.
Accurate identification of people’s faces is a very human process but computers are gaining on our processing. A look at what’s going on now and what we’ll see soon.