
Are dating apps safe?
We are used to entrusting dating apps with our innermost secrets. How carefully do they treat this information?
2960 articles
We are used to entrusting dating apps with our innermost secrets. How carefully do they treat this information?
In October 2017, Kaspersky Lab initiated a thorough review of our telemetry logs in relation to alleged 2015 incidents described in the media. These are the preliminary results.
The future doesn’t have to be a dystopian Internet of Things. We just have to prepare.
Kaspersky Lab announces comprehensive transparency initiative
This week’s Transatlantic Cable podcast dishes on pizza, unsafe kids smartwatches, and more.
Eugene Kaspersky responds in detail to recent allegations about his company and the Russian government.
Smart contracts have made Ethereum the world’s second-largest cryptocurrency. We explain what Ethereum is and how it fits with the trendy concept of ICOs.
We received the Platinum Award as part of the 2017 Gartner Peer Insights Customer Choice Awards for Endpoint Protection Platforms
What Russian hackers, American spies, the Israeli Intelligence Service, and Kaspersky Lab have to do with each other. What is happening, anyway?
Every Wi-Fi network using WPA or WPA2 encryption is vulnerable to a key reinstallation attack. Here are some more details and means of protection.
In this week’s edition of the Transatlantic Cable podcast, we discuss Equifax, PornHub, pulled AI and more.
The real scale of the Yahoo breach (spoiler: 3 billion), Facebook’s own Face ID, UK Lottery DDoS, and more.
The largest motor show in the world is the best place to see what cars will look like in the near future.
Transatlantic Cable Podcast episode 4: tax scams, trading data for swag, AI password cracking, and more.
A new blocker called nRansom locks users out of their computers and demands not money, but nude pictures.
A few more tips about gaming accounts safety, or How to protect your Steam, Uplay, Origin, battle.net and so on.
Several months ago, our experts found a bunch of vulnerabilities in Android apps that allow users to control their cars remotely. What has changed since then?
Tools for giving a well-reasoned explanation of why security solutions are a must-have
Cybersecurity is ever-changing how can executives stay ahead of the curve?
How facial recognition works in the new Apple iPhone X — is it secure enough for you to trust?
ACCEPT AND CLOSE
Notifications