
Hacking A…Toilet
Go ahead and add toilets to the increasingly long list of hackable consumer devices we’ve been compiling here on the Kaspersky Daily. In fact, one of the researchers at this
1126 articles
Go ahead and add toilets to the increasingly long list of hackable consumer devices we’ve been compiling here on the Kaspersky Daily. In fact, one of the researchers at this
Quantum computing and quantum communications; these concepts were invented just 30 years ago, after scientific journals refused to issue earlier publications regarding these subjects because it looked more like science-fiction.
Almost everyone knows computers need virus protection. Knowledge about safety and privacy-friendly online behavior is much less widespread, though, and extensive media coverage of Edward Snowden’s leaks regarding U.S. government
Another month has quietly slipped away and you’ve found yourself wondering if you’re all caught up on our articles from September. Not to worry, we’ve rounded up our top posts
September has come to an end and it’s time to check up on the progress that has been made by police forces and security experts in finding hackers and cybercriminals
Kaspersky Lab has adopted its wildly successful ZETA Shield from its corporate solutions and is implementing the technology into Kaspersky Internet Security 2014, providing even more robust security for everyday
Congratulations to our fourth stage winner in Kaspersky Lab’s 7 Volcanoes contest – Laura from Ireland! Laura entered the contest on behalf of her parents as a surprise gift to thank them
Online shopping, online money transfers and online banking save us a lot of time and make our lives easier. However, these same technologies also make life easier for cybercriminals by
Kaspersky Lab’s Brian Donohue rounds up the latest security news from the month of September 2013. [audio https://kasperskydaily.com/global/files/2013/09/podcast_september_Brian.mp3] Download podcast for offline listening
Passwords, the de facto authenticators, represent a serious security weakness for a number of reasons, chief among those is that humans quite simply tend to create bad passwords in order
An apparent flaw in Apple’s new operating system for its mobile devices allows anyone to access a user’s contact information and social media accounts without entering the security code to
That wireless router in your living room is essentially the hub for your entire home network. Nearly all of your devices are going to route through it and into you
The world has been up in arms about the expansive and invasive reach of the U.S. government’s National Security Agency (NSA) ever since the world was introduced to Edward Snowden
Samsung, maker of handsets and all devices tech-related, has created a secure Android environment called Knox, which aims to resolve the laundry list of security problems facing IT teams as
Apple strengthens user protection in their new flagship smartphone meaning biometric identification might finally go mainstream. Is it good or bad, and what are the potential consequences? First, we’ll try
You have probably already heard about the security of iOS and how Apple controls its App Store. In fact, they are doing an exceptional job since the release of iOS,
You might think that, much like a pirate going into battle, the more weapons you have at your disposal for your protection the better: cutlass in one hand, pistol and
A housewarming party is always a great occasion, especially when the house is spacious, well-located and filled with happy people! Our HQ, where 1,600 of our 3,000 employees work, is
Record number of visitors at Gamescom this year Last week, the world’s largest gaming convention, Gamescom, took place in Cologne for the third year running. The many innovations and exclusive
August has come and gone, you’re home from vacation and you’re ready to settle back into your routine. So make sure you’re prepared for the month ahead by catching yourself
ACCEPT AND CLOSE
Notifications