5 Million VTech accounts hacked – kids’ data exposed
Nothing says the holiday season like over-spending on toys and devices for our children. It really shows how much we care – right? Chances are, there is a toy or
451 articles
Nothing says the holiday season like over-spending on toys and devices for our children. It really shows how much we care – right? Chances are, there is a toy or
Over the past few weeks, we’ve discussed a few areas where you should brush up on your personal privacy settings for both Facebook and Google. Chances are you read it and said, “man
What is the best channel to exchange private information on? Or even better, what channels should you avoid using for this type of sharing? It goes without saying that it’s
As proven by Ed Snowden and Co., utopias are a myth. The anti-utopian storylines have been ingrained in our everyday lives. Technological progress brings a lot of magnificent things like crime
When I was growing up, my parents would often embarrass me in front of future ex-girlfriends as well as my friends by pulling out photo albums compiled of photos from
Abuse of big data means your worst paranoia scenarios come true, including, among other things, the endless government surveillance, insurance agencies despotism and employers tyranny. Like it or not, the
Over the past few weeks, you have more than likely seen our research on Digital Amnesia. It is also quite possibly that you may have forgotten it, given your affliction with Digital
Merely 23 years ago Microsoft released Windows 3.1 operating system, Apple showed its first iPhone PDA, and Linus Torvalds released Linux under GNU license. Eugene Kaspersky published the book with
Connected devices give us access to an unlimited source of information — the Internet. They also serve as a reserve data storage for unmindful owners. Basically, the majority of smartphone
Vitaly Kamluk has more than 10 years of experience in IT security and now he holds the title Principal Security Researcher at Kaspersky Lab. He specializes in malware reverse engineering, computer
Why would cyber-criminals want to control your Facebook account? At the very least, they could “like” weird things and promote questionable goods and services on your behalf. However, Facebook is
An online password manager can make your life much easier by automatically entering individual passwords for each website and service you visit. It is a very convenient tool – unless
Just ten days after the remarkable Google I/O event, Apple is holding its own developers conference in the same place, Moscone Center, in San Francisco, CA. Traditionally, WWDC is focused on
Local governments and law enforcement are becoming increasingly more reliant on networked surveillance cameras in order to monitor densely populated urban areas. London is a notorious example of urban surveillance,
Recently, Apple’s CEO Tim Cook delivered a speech on privacy and security during EPIC’s Champions of Freedom event held in Washington, DC. We want to share with you the 10 best quotes
Recently Kaspersky Lab experts have found a sly method that allows fraudsters to steal personal information without access to the user’s login and password. The cyber criminals do not try
Despite the fact that Google I/O is a developers conference, it always gets the attention of journalists and consumers as well. The reason is simple: this is when Google shows
Updated: Current principles for the processing of user data by Kaspersky Lab security solutions and technologies can be found here. While the cloud-based security approach is not a novelty, it’s
In theory, it’s common knowledge that “there’s no such thing as a free lunch”, but when it comes to practice, some forget about the ‘free lunch’ proverb and prefer another
Photographer Curtis Wallen’s latest exhibit, “Proposition For An On Demand Clandestine Communication Network,” opened in a Brooklyn art-house Sunday. The work explored what it would take for a normal person to
During my first two weeks of the biochip experience I had time to mull over a lot of things. The deluge of questions from the community pushed this process further: it’s one