Experiment: How easy is it to spy on a smartwatch wearer?
We investigate intercepting smartwatch motion-sensor data to monitor people and steal information.
52 articles
We investigate intercepting smartwatch motion-sensor data to monitor people and steal information.
What is the cost of an incident that affects corporate data? Which threats are the most expensive? Learn that and more from our latest research.
Find out if your smartphones, tablets, and laptops are coming between you and your loved ones.
Sex sells, as they say in advertising. In cyberspace porn serves as one of the most popular tools for malicious activity.
On this Kaspersky Lab podcast, Jeff talks with Sergey Golovanov about his SAS 2018 training on APT hunting.
The CryptoShuffler Trojan does its utmost to go unnoticed, stealing Bitcoins on the sly.
A story about a large malicious campaign carried out in Facebook Messenger — and how it worked.
The annual RSA conference will often overwhelm the average attendee. Between the great talks, the exhibition hall, the parties, and the city of San Francisco itself, there is a whole
People truly enjoy the perks of the digital era and tend to shop and pay online or via mobile banking. Research commissioned by Kaspersky Lab confirmed that the majority of users (81%)
Have you ever considered how much of our self-confidence depends on likes nowadays? Digital communication is meant to shrink distances and connect people from different cities and countries – to
A recent survey of 4,831 active social network users, conducted by Kaspersky Lab in 12 countries, reveals that an overwhelming majority (78%) of respondents considered quitting their social networks —
Usually when we talk about encryptor ransomware, we recommend that victims do not pay the ransom. To begin with, paying encourages malware creators to continue their operations. It’s simple supply
Humanity is steadily getting older, which, in turn, increases the number of elderly people online. Today, almost almost 18% of Facebook users are 55 or older. We set out to learn what
Picture this irritating scenario: You are installing an update for Notepad++, Yahoo Messenger, or WinRAR and your antivirus pipes up to warn you the software is malware. You know that
Nowadays, it seems like every company has a smartwatch. They can do everything from tracking your heart rate to making phone calls and gasp telling time. But did you know that they
At the recent Chaos Communication Congress in Hamburg two IT experts, Felix Domke and Daniel Lange (former Head of IT strategy at BMW) gave a talk on what exactly had happened with
Each year the number of people “addicted to Internet” grows rapidly. We can read news, communicate with friends, look through photos and videos right from our smartphones. It’s only logical,
Turla APT group, also known as Snake and Uroboros, is one the most advanced threat actors in the world. This cyber espionage group has been active for more than 8 years,
If hacking were high fashion, this season’s hot trend would be car hacking. Shortly after researchers Charlie Miller and Chris Valasek revealed details on Jeep Cherokee’s breach, another team managed to take over a Tesla
Security researcher Chris Rock discovered, that it’s very easy to kill a human. We are talking in a legal sense not the one that carries moral and legal consequences. All you need