
Hackers broadcast live footage from hacked webcams on YouTube and trolls are loving it
Internet-trolls are back in the game: 2ch anonymous hacked hundreds devices and streamed video from victims’ homes for the kick of it.
3945 articles
Internet-trolls are back in the game: 2ch anonymous hacked hundreds devices and streamed video from victims’ homes for the kick of it.
We talk about ever-present connectivity. What does that mean for raising kids?
Ransomware is mostly the end-user problem. However, businesses get hit too, and hit hard, especially the smaller ones.
Spotify users’ account data once again found its way onto Pastebin. Change your password.
CryptXXX ransomware encrypts files, steals data and bitcoins. Sounds serious, but we have a solution!
A new strain of ransomware targets servers which is, mildly put, a troubling development.
The big hunt begins: hackers are eager to make their buck before every merchant in US moves to chip-and-pin cards
Yet another ZeuS variant is threatening businesses.
Aggressive moral crusaders search for porn actresses accounts on VK.com and cyberbully them along with their friends and families.
The Kaspersky Daily team checks if FindFace can really find users on a social media site with one image taken on the street and if it is possible to hide from it. Some interesting peculiarities detected!
Hackers took control over several USA FM stations’ equipment and released a provocative podcast on the air.
It’s not common that the ransomware criminals can be outsmarted. But sometimes they can be.
Windows is in the process of rolling out new changes to the fabled BSOD (‘Blue Screen Of Death’) which could have security implications.
A group of security researchers have discovered major flaws in Google’s reCAPTCHA technology.
Users also want and expect access to data 24/7, with no barriers or lag times.
How everyone and his dog online make the big data tyranny raise.
Kaspersky Lab has developed a new solution to provide industrial cybersecurity – Kaspersky Industrial CyberSecurity.
Ryan Naraine and Juan Andrés Guerrero-Saade discuss the threat landscape and what is being done to prevent major attacks.
VPN’s features and pitfalls from legal and technical standpoint
Cryptomalware can infiltrate and encrypt an entire network – including its backups – within minutes.