
Hacking my car, remotely this time
It’s up to the manufacturers to change the approach to designing modern hi-tech equipment. As we have written before, security should come first. It must be taken in account at the design level, not added later.
3930 articles
It’s up to the manufacturers to change the approach to designing modern hi-tech equipment. As we have written before, security should come first. It must be taken in account at the design level, not added later.
A contactless bank card is a super-convenient thing. However, its ease of use would make you wonder whether stealing your money is equally easy.
If it is not possible to get rid of a risky software for some reason, it is better to exist in a “presumption of guilt” mode, with an efficient security solution keeping it in check and preventing exploits from successful attacks, targeted ones included.
What should you do if you use Kaspersky Lab products and you’re looking to upgrade your operating system to Windows 10?
Cybercriminals know how to benefit from your mobile devices. Be vigilant and follow our recommendations to secure your smartphones and tablets.
Top-level IT security pros believe there’s a significant, unaddressed gap between enterprise security priorities and the serious threats that keep them awake at night.
Ericsson and Qualcomm are promoting their new technology, LTE-U. Is it any better that LTE-A? And what is this combinations of letters supposed to mean, after all?
Minidionis is yet another backdoor from the same APT group responsible for CozyDuke, MiniDuke, and CosmicDuke – this time with some “cloud” capabilities.
Taking over a Jeep Cherokee driving at speed 70 mph at a remote highway is quite real.
A bottle of good scotch in exchange for a day without a smartphone? Would I dare? That’s a piece of cake! That’s what I thought. As it turned out, it’s not that simple nowadays
These days, ransomware-related news stories look a bit like, well, war chronicles. In fact, this is the consequence of an elevated attention to this particular kind of threat; similar things occurred in early the 2000s when net-worms thrashed the Web.
Private data of 37 million users are at risk after a huge data breach on the popular Ashley Madison dating site.
Exploits are a subset of malware, but they are not always detectable by security software if it doesn’t employ behavior analysis. In fact, it’s the only good way to beat exploits. Malware programs may be plentiful and varied, but most of them have similar behavioral patterns.
Cybercriminals often pretend to be nice and amiable. Here are a few rules how not to become a victim of these malicious folks.
In next 10-20 years UAVs, in one or another manner, will become an integral part of our life, but still remain highly prone to vulnerabilities and security issues.
With all of the security improvements, criminals find and exploit various ways of circumventing them to deliver their malicious creations to end-users’ phones, which puts at risk both the device owners and the businesses they are involved with.
Andrey Pozhogin, cybersecurity expert at Kaspersky Lab, provides his expertise on the growing trend of ransomware attacks and what users and companies can do to protect themselves.
More than a half of mobile devices users carry out financial transactions on them, and roughly the same amount stumbled upon a financial threat recently. Yet, in most cases, there are no security solutions and/or passwords in place.
The TeslaCrypt ransomware family is notable for targeting games-related files, as well as the usual documents. In the new version, it became even more dangerous.
You tell them: Hey guys, you have snakes in your backyard. And they tell you: No, no, that’s impossible. They stick to their belief until the moment when a stick under their own leg turns into a venomous monster.
Want to defeat a cybercriminal? Stay calm, be smart, and check twice. Here is a list of security rules for every smart person who cares about cybersecurity.