
Digital detox or Doctor, I’m attached to my smartphone — is it normal?
How did you like it the last time you saw your friends? Did you have a nice chat with them? Or were you all only taking pictures of your meals
2960 articles
How did you like it the last time you saw your friends? Did you have a nice chat with them? Or were you all only taking pictures of your meals
Local governments and law enforcement are becoming increasingly more reliant on networked surveillance cameras in order to monitor densely populated urban areas. London is a notorious example of urban surveillance,
Recently, Apple’s CEO Tim Cook delivered a speech on privacy and security during EPIC’s Champions of Freedom event held in Washington, DC. We want to share with you the 10 best quotes
Recently Kaspersky Lab experts have found a sly method that allows fraudsters to steal personal information without access to the user’s login and password. The cyber criminals do not try
Cyberbullying, bullying that takes place using digital technology, has become a serious issue. One of four child between the ages of 12 and 17 has experienced cyberbullying in one form
Despite the fact that Google I/O is a developers conference, it always gets the attention of journalists and consumers as well. The reason is simple: this is when Google shows
Virtual reality experiments have been continuously carried out since user PCs learned to process graphics. Step by step, the tech has become capable of creating virtual worlds that look relatively
While LTE networks are seemingly just now starting to take off and are not yet omnipresent, networking vendors and carriers are already fully engaged in a vivid discussion on 5G’s
Merchant vessels are continuously becoming bigger and getting more electronic systems. Seafarers often depend on technology data more than their own skills, knowledge, and senses. Crews are becoming smaller as computer
Ransomware is a kind of malware that steals users’ files and exacts a ransom from its victims. The most effective approach is to encrypt the files and offer decryption keys
Much has been said about the VENOM vulnerability, the latest in an increasingly long line of bugs affecting vast swaths of the Internet. It’s an old-school bug of the relatively new-age
The Chinese-language Naikon advanced persistent threat group is targeting military, government and civil organizations located in and around the South China Sea, which is an increasingly contentious hot-bed of territorial disputes between
When you look at airplanes moving on a map, using some tracking service like Flightradar24, you get the feeling it’s sheer Brownian motion. It may look like an abundance of aircrafts moving
Today we will relate a Kaspersky Lab implantation experiment to a comprehensible, and culturally relevant concept – the use of Jedi Force™. This might surprise you, but with the current
Updated: Current principles for the processing of user data by Kaspersky Lab security solutions and technologies can be found here. While the cloud-based security approach is not a novelty, it’s
Yesterday my favorite part of Kaspersky Lab — which is certainly the lab itself – grew, as we have opened our first European Research Center. It will be home to
In yet another example of smart medical device insecurity, it has emerged recently that a line of Hospira drug pumps are exposed to a series of remotely exploitable vulnerabilities that could
It’s curious how the tone of the discussion has been changing since the topic of driverless cars first received traction in the media. This time last year, the majority of debates centered around
We’ve created an infographic that shows how the Kaspersky Lab flagship antivirus software has improved over the last several years.
Yet another APT of the ‘Dukes family’ is hitting high-profile targets, including the US government office. This time it’s CozyDuke, also known as CozyBear, CozyCar or “Office Monkeys” in honor of
SAN FRANCISCO — It’s an utterly played out platitude that the security industry is largely failing at its mission to protect computers and networks and all the nearly infinite data
ACCEPT AND CLOSE
Notifications