Hacking a car: a real threat or yet another shocker?
2015 proved: it’s possible to hack a connected car remotely. But is it as dangerous as it seems?
3899 articles
2015 proved: it’s possible to hack a connected car remotely. But is it as dangerous as it seems?
A massive flaw in transport layer security (TLS) protocol was discovered and it leaves millions vulnerable to an attack that could expose financial data and more.
Are you sure that one-time SMS passwords reliably protect your mobile bank? Think again! In this article we explain how Trojans fool two-factor authentication.
At the 2016 RSA conference, Kurt Baumgartner spoke on why we need to put some emphasis on security for the transportation industry.
We have previously discussed what VPN is. Now let’s review its implementations and their advantages and drawbacks.
The average American’s data has been stolen several times. Now when it’s done, what would a cybercriminal do next? We have discussed it at RSA Conference 2016.
According to figures released by Kaspersky Lab, about 16% of companies worldwide suffered a DDoS attack, rising to a quarter of enterprises.
While the popular notion is that Macs are virus-proof, it is actually quite a myth. These computers can catch viruses and Ransomware.
Find out how to make sure you’re keeping your Tumblr account as secure as possible.
Securelist issued a quick heads-up on what they called new ‘implants’ for OS X. It looks as though the notorious Hacking Team is back in business.
In this post we explain, what’s new in the latest update of the Private Browsing tool and how to use it.
Does your use of social media make you a liability to your company?
Triada is a modular mobile Trojan that actively uses root privileges to substitute system files and uses several clever methods to become almost invisible
A look at the evolution of mobile threats in 2015 and some predictions for 2016
We’ve reached an age where our digital and analog lives are one and the same. How can we make sure our kids grow up digitally savvy and safe?
Kaspersky Lab launches two new enterprise solutions for preventing the most sophisticated cyberthreats organizations encounter worldwide.
While many mobile applications serve as a mere distraction, these apps can help simplify or streamline your daily life.
Over the weekend, Snapchat was compromised via a phishing email pretending to be from company CEO.
Shodan and Censys are the search engines for the Internet of Things and this duo is capable of wreaking havoc in a lot of different ways
Summarizing the scary security trends coming out of the Mobile World Congress 2016 in Barcelona.
The next step in SIM cards evolution is not about squeezing them into even more miniscule form factor, it’s about replacing them at all — with a profile stored in connected device.