How millions of Kia cars could be tracked
A vulnerability in Kia’s web portal made it possible to hack cars and track their owners. All you needed was the car’s VIN number or just its license plate number.
71 articles
A vulnerability in Kia’s web portal made it possible to hack cars and track their owners. All you needed was the car’s VIN number or just its license plate number.
Why cybersecurity in education is critical, and how to protect schools from attacks.
Independent cybersecurity lab AV-Comparatives put 15 anti-phishing solutions to the test — with only eight making the grade. We took home the gold, adding to our already extensive collection of accolades.
Based on our analysis of ZKTeco vulnerabilities, we dissect the risks associated with biometric authentication.
How to switch the cyber-protection on your computer or smartphone to the most awarded security solution from Kaspersky.
In 2023, our products and solutions took part in precisely 100 independent studies — winning 93 times: our best year ever.
To go undetected, attackers can operate in your network without any malware at all. How to detect them and prevent damage?
Today we’re talking about crypto drainers — one of the most serious threats to crypto owners — and offer tips on fending it off.
AV-Comparatives has named our new Kaspersky Standard as Product of the Year. This is the highest honor conferred by this renowned independent lab specializing in testing security solutions.
Legacy systems continue to toil away in embedded solutions, medical equipment, and precision instruments. How can the respective security risks be mitigated?
Smart devices are easy targets for cybercriminals. Here’s how to protect your smart vacuum cleaner, air conditioner and other connected devices.
Who evaluates security solutions, and how? We report the past year’s tests and awards.
How can you make your parents secure, technologically speaking? By setting up protection remotely, without visiting them.
How to stay safe from ransomware with free protection against cryptors and free decryption tools.
Imagine a security solution that adapts to your lifestyle and protects you wherever you need it. We’ve designed that solution — take a look at Kaspersky Security Cloud.
It makes sense to assess risks and carefully craft a protection strategy before adopting mobile device usage at work.
It’s not Malevich’s Black Square. This is what a screenshot taken by a suspicious application on a computer protected by Kaspersky Lab products looks like.
Hidden miners detected in soccer and VPN apps on Google Play — steer clear!
Most computer infections come from visiting porn sites, or so some people say. Are they right?
Sex sells, as they say in advertising. In cyberspace porn serves as one of the most popular tools for malicious activity.
Our infographics will help you find the security solution that suits you best.