7 reasons you shouldn’t post your boarding pass online
Checking in to an airport to brag that you are on your way to a Parisian getaway is so yesterday. For starters Swarm has lost it’s luster and usage since it
2767 articles
Checking in to an airport to brag that you are on your way to a Parisian getaway is so yesterday. For starters Swarm has lost it’s luster and usage since it
A year ago our colleague David Jacoby, a researcher at GReAT, successfully attempted to hack his own home and discovered a lot of curious things. David’s experiment inspired many Kaspersky Lab
The World Wide Web is probably the most widespread project created in the history of humanity. With each passing year, the Internet grows exponentially. It needs cables, servers, towers and
Kaspersky Lab had an outstanding participation during GITEX technology week (18-22 October) in Dubai. The company has presented our popular security solutions, targeting enterprises, and small to medium companies, like DDoS,
It’s not easy to be successful even in advantageous time, and it is even more challenging to stay best in class for nearly two decades. This year our company turns
As proven by Ed Snowden and Co., utopias are a myth. The anti-utopian storylines have been ingrained in our everyday lives. Technological progress brings a lot of magnificent things like crime
When I was growing up, my parents would often embarrass me in front of future ex-girlfriends as well as my friends by pulling out photo albums compiled of photos from
We are often asked by our customers which one of our products is better – Kaspersky Internet Security or Kaspersky Total Security. To that we often ask – What are you looking for?
Gaza cybergang is a politically motivated Arabic cybercriminal group operating in the MENA (Middle East North Africa) region, targeting mainly Egypt, United Arab Emirates and Yemen. The group has been operating
We are still in the midst of the smartphone boom. Over the past couple of years, over 50% of all mobile devices used by consumers are smartphones. In turn, this
Turla APT group, also known as Snake and Uroboros, is one the most advanced threat actors in the world. This cyber espionage group has been active for more than 8 years,
While iOS is notorious for being innately secure, headlines over the past three days have challenged that. The noise was brought upon by a ‘terrible’ KeyRaider hack, which compromised more than
“Sensation!! Buy this super-effective anti-freckle treatment!” “The only way to battle nightmares for good!!” “Unique diet!! Just stop eating these 5 products…” – I won’t even dare to ask if
Remember last year’s well-publicized leak, which exposed some celebrities’ nude photos? The story not only made some individuals’ day (and probably night), it turned to be a very educating precedent. For
In-flight security made quite a lot of headlines earlier this summer, but this time at unusual angle. Aviation has always been focused on safety and had remained the most secure
Abuse of big data means your worst paranoia scenarios come true, including, among other things, the endless government surveillance, insurance agencies despotism and employers tyranny. Like it or not, the
Cyber-physical security researchers Marina Krotofil and Jason Larsen presented their research on hacking chemical plants at Black Hat and DEF CON – this was a very fascinating talk. It’s not that hacking a chemical
When you hear adults saying, “kids are helpless,” it makes you angry, right? You bet it does even if you are the most self-sustained teen in the history of your
Over the past few weeks, you have more than likely seen our research on Digital Amnesia. It is also quite possibly that you may have forgotten it, given your affliction with Digital
Merely 23 years ago Microsoft released Windows 3.1 operating system, Apple showed its first iPhone PDA, and Linus Torvalds released Linux under GNU license. Eugene Kaspersky published the book with
If hacking were high fashion, this season’s hot trend would be car hacking. Shortly after researchers Charlie Miller and Chris Valasek revealed details on Jeep Cherokee’s breach, another team managed to take over a Tesla