
What about drones?
On the one hand, drones are bound to violate privacy, whether on purpose or not. On the other, we’ve yet to discover and unleash their full potential.
2943 articles
On the one hand, drones are bound to violate privacy, whether on purpose or not. On the other, we’ve yet to discover and unleash their full potential.
We have constructed a list of promises that you should make to yourself this year to stay safe both online and offline.
Anyone who goes online could be hacked. During Christmas time, this possibility doubles as we make a number of purchases and get so excited that we forget about security.
For the second time in three years, Sony is the main character in a massive and humiliating cyberattack.
A new variant of the Zeus banking trojan has emerged, targeting consumer accounts at 150 banks in 15 countries.
Everyone is afraid of hackers, phishers and other online criminals dwelling in the shadows of the Internet. But this particular story is not about the online world, instead, it is about real life, and it will teach you to always remain alert.
As you know, it is quite important to have a strong password. But what is a strong password?
One of the most highly anticipated prospects of the 21st century has been the possibility of enabling robots to drive cars. But how soon could this be possible?
Applying the incorrect settings to your router may lead to serious problems. Here is a short guide to protecting your home Wi-Fi network.
Kaspersky Lab experts analyze the security and privacy trends that emerged in 2014, including anonymous Tor browsing, ransomware, APT attacks and more.
Kaspersky Lab experts make predictions about what trends will emerge in the security industry in 2015.
We are almost one and a half decades into the century of biometry and gesture controls, but our cars still have a steering wheel and two to three manual controls. Is this going to change?
We tend to think that protecting ourselves against future threats is most important. But, perhaps we need to take a step back and solve some of the major problems that we already know about.
We have seen a number of cases where a user has deleted our product for Android and ended up with a locked device. Here we discuss why this happens and what can be done about it.
Children are crazy about tablets but it is important to set limitations in order to prevent it from becoming a real obsession. Here are a couple of tips to help you tame your child’s iPad.
In this Talk Security podcast, Threatpost’s Chris Brook and Brian Donohue discuss the move to encrypt the Web, the Regin APT campaign and more.
Let’s take a moment to discuss why people tend to skip updating and upgrading their security solutions, and why this is detrimental.
A new APT campaign called Regin targets the usual victims plus a prestigious cryptographer and the GSM standard on which most cellular communications occur.
Let’s take a moment to discuss the numerous troubles that our bright, technology-packed future could bring about.
Recent news concerning “hacked webcams” or “breached baby monitors” appears to be all over the place. Let’s take a closer look at the situation.