LastPass users need to change their passwords immediately
An online password manager can make your life much easier by automatically entering individual passwords for each website and service you visit. It is a very convenient tool – unless
342 articles
An online password manager can make your life much easier by automatically entering individual passwords for each website and service you visit. It is a very convenient tool – unless
Just ten days after the remarkable Google I/O event, Apple is holding its own developers conference in the same place, Moscone Center, in San Francisco, CA. Traditionally, WWDC is focused on
Local governments and law enforcement are becoming increasingly more reliant on networked surveillance cameras in order to monitor densely populated urban areas. London is a notorious example of urban surveillance,
Recently, Apple’s CEO Tim Cook delivered a speech on privacy and security during EPIC’s Champions of Freedom event held in Washington, DC. We want to share with you the 10 best quotes
Recently Kaspersky Lab experts have found a sly method that allows fraudsters to steal personal information without access to the user’s login and password. The cyber criminals do not try
Despite the fact that Google I/O is a developers conference, it always gets the attention of journalists and consumers as well. The reason is simple: this is when Google shows
Updated: Current principles for the processing of user data by Kaspersky Lab security solutions and technologies can be found here. While the cloud-based security approach is not a novelty, it’s
In theory, it’s common knowledge that “there’s no such thing as a free lunch”, but when it comes to practice, some forget about the ‘free lunch’ proverb and prefer another
Photographer Curtis Wallen’s latest exhibit, “Proposition For An On Demand Clandestine Communication Network,” opened in a Brooklyn art-house Sunday. The work explored what it would take for a normal person to
During my first two weeks of the biochip experience I had time to mull over a lot of things. The deluge of questions from the community pushed this process further: it’s one
The latest in a long line of whistleblower Edward Snowden’s National Security Agency revelations may be among the most shocking: that the NSA and its British counterpart, GCHQ, allegedly compromised
It turned out that Lenovo’s laptops had been shipped with an adware called Superfish. It possibly allows eavesdropping on encrypted connections.
There is a flood of appliances which could be connected – and some are connected – without a second thought as to whether or not it’s necessary or secure.
Let’s talk about the dangers of cross-border payments with plastic cards and security flaws in payment systems architecture.
Buried in Samsung’s terms of service is the admission that spoken words are picked up and passed along to third parties by voice recognition.
WhatsApp has finally released a Web version of its popular mobile messaging service. We take a look at it from the security perspective.
The Internet continues to find its way into the private lives of its users. Here, we brief you on the most common methods of online tracking.
The top privacy data leaks in 2014 include: data breaches at Target and Home Depot, hacks of JP Morgan and Barclays banks, and leaks at Orange and Dropbox.
“British Prime Minister David Cameron to Ban Encrypted Messengers” — Headlines like this are appearing here and there. But what happened exactly?
CES 2015 was a superb event in terms of the amount of new technology per square foot. But, from an information security standpoint, it did not appear all that positive.
On the one hand, drones are bound to violate privacy, whether on purpose or not. On the other, we’ve yet to discover and unleash their full potential.