Smart home apocalypse
At MWC 2018, Kaspersky Lab researchers show how easily a smart home can be hacked.
756 articles
At MWC 2018, Kaspersky Lab researchers show how easily a smart home can be hacked.
Chrome learns to block ads by itself. What has Google come up with, and how will it help users?
Kaspersky Lab publishes an update on Russian-speaking Sofacy APT activity in 2017
We’re pretty sure you haven’t heard of at least one of these cryptocurrencies. Wanna bet? Take our test and find out!
Belgian police and Kaspersky Lab obtain decryption keys for files hit by Cryakl.
The story of Kaspersky Lab’s alleged misdeeds is juicy — let’s check out how this fiction is made.
Sex sells, as they say in advertising. In cyberspace porn serves as one of the most popular tools for malicious activity.
Do border agents have the right to search your devices? How can you protect your data from searches at the border? We have 11 tips covering this topic.
If someone offers cryptocurrency for nothing, remember the only free cheese is in a mousetrap. Here’s what’s really going on.
The infrastructure for electric cars is developing, and the number of cars grows rapidly. But do providers even care about security?
Xiaomi’s robotic vacuum cleaner was hacked by security researchers. However, it proved much more secure than most other smart devices.
Meltdown and Spectre: the two vulnerabilities that threaten every device on Intel, AMD or ARM processors
What 2017 will be remembered for, which of our experts’ predictions came true, and what they think about the future
We’re launching the Global Transparency Initiative. What is it? Eugene Kaspersky explains.
Eugene Kaspersky responds in detail to recent allegations about his company and the Russian government.
A new blocker called nRansom locks users out of their computers and demands not money, but nude pictures.
What should you do if your antivirus detects something it calls “not-a-virus”? What kind of applications are behind this message, and what is all the fuss about?
Android Trojans have been mimicking banking apps, messengers, and social apps for a while. Taxi-booking apps are next on the list.
Microsoft changes its approach to cybersecurity solutions in response to partner feedback
What do movie characters typically do when there is a door with an electronic lock on their way? They call a hacker, of course. The hacker connects some sort of contraption to the lock. During the next several seconds, the device picks every possible combination and shows it on its (obligatory, bright) segment display. Voilà! The door is open.