Hacking a car: a real threat or yet another shocker?
Since last year, there is no doubt that it’s possible to take control over a connected car remotely. Despite this, we can see zero uncontrolled cars on the streets that obey only
426 articles
Since last year, there is no doubt that it’s possible to take control over a connected car remotely. Despite this, we can see zero uncontrolled cars on the streets that obey only
Two-factor authentication with SMS is widely used by banking institutions. Of course, this measure works better than a mere password but it’s not unbreakable. Security specialists found out how it can be
It may only be a few years old, but Snapchat has already become one of the most popular Social Media apps out there. It’s been reported to have over 100 million
Nowadays, it seems like every company has a smartwatch. They can do everything from tracking your heart rate to making phone calls and gasp telling time. But did you know that they
Installing a security solution is important, however you just cannot assume that you are done there. Keeping your antivirus databases up-to-date is just as important as the initial install. Kaspersky
In the first part of our story we covered the history of SIM cards. Now let us get down to their security. One of the first vulnerabilities in SIM cards that was
In today’s post, we’ll offer the answers to some questions that Kaspersky Academy fielded to Chief Marketing Officer at Kaspersky Lab, Alexander Erofeev. He will tell us about the role
One thing you might not know about hackers is that besides cracking some virtual systems many of them are fond of hacking real world stuff as well. One thing of
Being a parent is hard. Parents have too many things to worry about when it comes to their kids, ranging from childcare and schooling to eating healthy and screen time.
In a previous article, we explained the difference between Kaspersky Total Security and Kaspersky Internet Security. Now, let’s compare Kaspersky Internet Security and Kaspersky Anti-Virus. Kaspersky Anti-Virus offers basic security for your
A SIM card, or Subscriber Identity Module is a familiar element of a mobile phone. It can be easily swapped or replaced, yet, it was not born at the same
Quantum computers are said to be coming quite soon and will change the world forever. While that phrase would typically mean a revolution in physics and medicine, the change which
Nowadays, free public Wi-Fi is available almost everywhere in our cities. We can access the Web from the streets to the subway and buses, not to mention venues ranging from
Today a smartphone has become an integral part of our life. We constantly use phones for work, study, travel, and they are increasingly starting to know more about us than we
Following recent terrorist attacks accusations against encrypted means of online communications once again became louder. However the proposed solutions could create even more problems. Governments around the world – from
Ransomware has become one of the most notorious cyberthreats. Once a ransomware Trojan infiltrates your system, it stealthily encrypts your files, including your valuable documents, videos and photos. This entire
Over the past few weeks, we’ve discussed a few areas where you should brush up on your personal privacy settings for both Facebook and Google. Chances are you read it and said, “man
By now, you’ve probably seen a ton of advertisements, heard commercials or noticed that your local shops have flipped the switch to that most wonderful time of the year. If
What is the best channel to exchange private information on? Or even better, what channels should you avoid using for this type of sharing? It goes without saying that it’s
Today, we will continue on with our mythbusting Fact or Fiction series with a tale surrounding a unique feature believed to be tied to ATM machines around the world. “If
If you sit and think about it for a second, online phishing is not that far from actual fishing. The one major difference is that the online fishermen are criminals.