BEWARE THE THINGBOT!
We talk about hackable consumer devices a lot here on the Kaspersky Daily. Generally though, the hacks are hypothetical, performed in controlled environments by computer scientists and professional hackers, some
59 articles
We talk about hackable consumer devices a lot here on the Kaspersky Daily. Generally though, the hacks are hypothetical, performed in controlled environments by computer scientists and professional hackers, some
If it seems like the list below is dominated by recent events, that is for good reason: Major media outlets have increasingly poured resources into their websites and social media
Any movie, be it horror, action or thriller, has a moment that any IT specialist would call comedic, when a demonstration of a mainframe hacking, a virus in action or
If you’re reading the Kaspersky Daily with any degree of regularity than you likely already know that it is very possible to hack the modern automobile. In fact, I wrote
It’s always good to have a real expert answering your questions. We’ve found the best of the best – members of Kaspersky’s Global Research and Analysis Team (GReAT), the research
On the night of June 5, 2013 a coalition led by the FBI and Microsoft broke up a botnet of two million connected PCs that was being used by cybercriminals
Las Vegas – On the last day of July and the first day of August, a Roman empire-themed hotel and casino in the the Mojave Desert played host to what
We’re continuing to watch how law enforcement agencies around the world are progressing in the fight against cybercrime. They’ve been able to keep jailing hackers, both for minor cybercrimes like
Have you ever wondered what a hacked computer, email address, or other online account is even worth? Sure, it seems pretty obvious that there’d be some serious value in a
Father’s Day is fast approaching, which means finding the perfect gift for dad should be at the top of your to do list. And if you’ve had your eye on
If Achilles’s heel was his vulnerability in the Iliad, then Paris’s poison tipped arrow was the exploit. Quite literally, an exploit is the device or – more often than not
Crime in the virtual world has long been a tough nut to crack for law enforcement agencies and the courts. Getting to the bottom of a cyberattack and then gathering
Most people are aware that there is a seemingly infinite sea of hackers out there whose goal in life is to steal sensitive data from corporate networks. And while tomes
A report out earlier this year indicated that robbing banks in the UK is a risky business, and not very lucrative at that: Bank burglars in Great Britain net an
Smartphones and tablets make it possible for business travelers to stay connected to their corporate networks while on the road as never before. But, like any other platform, these mobile
Travelers abroad beware: Pop-up windows that require you to download a supposed software update in order to get online may instead be installing a malicious program that could harm your
There’s no two ways about it, cybercrime is big business. Accurate estimates are hard to come by, but you can safely assume it’s well into the billions of dollars. Likely