Hacking the Modern Automobile
If you’re reading the Kaspersky Daily with any degree of regularity than you likely already know that it is very possible to hack the modern automobile. In fact, I wrote
3894 articles
If you’re reading the Kaspersky Daily with any degree of regularity than you likely already know that it is very possible to hack the modern automobile. In fact, I wrote
Everyday millions of computers solve the same problem; these machines try to check if you are actually you and not some other person. The most popular tool to do that
Kaspersky Lab’s Brian Donohue explains two-factor authentication Download podcast for offline listening
We are constantly on our mobile devices or desktops and much of this time is spent using apps or online games. In our latest poll, Kaspersky Lab asks, how much you’ve
Kaspersky Lab has published its report on the evolution of threats in the second quarter of 2013. This period has been marked with a number of security incidents of different
Even if you follow all the Cardinal Rules of system security — you regularly update your operating system and programs, avoid spam like the plague and never click through on suspicious
Let’s imagine you already configured Kaspersky PURE by following our tips to do so on your computer. However, then you get a new computer, you install Kaspersky PURE on that…
Go ahead and add insulin pumps and pacemakers to the ever-expanding list of computer-like-devices that contain bugs and are therefore vulnerable to exploit. That’s right, that little metal thing inside
Using leased infrastructure for storing large amounts of data has been typical for several years. Leased capacities provide an advantage by allowing businesses to greatly reduce the cost of tending
A lot of families buy computers and devices as kids head back to school, making it the time of year for those comprehensive “101% Protection” anti-virus and Internet security suites
Kaspersky Internet Security has shown 100% efficiency in blocking Zero-day threats in independent test. Criminals constantly look for backdoors and vulnerabilities to discreetly infect your PC with malware while you
By this point you should be fairly well aware of the threats facing you when browsing the Internet on your digital devices. From phishing scams in your inbox to malicious
As we have mentioned, there are many ways to compare anti-virus software, but the most straightforward, we believe, occurs when researchers simulate real user behavior, and are confronted with online threats
In today’s age of technology, our various devices like laptops, smartphones and tablets are important places for storing sensitive data and are used on a daily or weekly basis. They
Kaspersky Lab’s Brian Donohue explains the latest on mobile hacks on Blackhat Download podcast for offline listening
Part two. The first part is available here. Risks associated with the vulnerabilities Bluebox reported that the vulnerabilities could be used to attain root rights in the system providing
It’s always good to have a real expert answering your questions. We’ve found the best of the best – members of Kaspersky’s Global Research and Analysis Team (GReAT), the research
The second half of July roused Android users as two very serious and unpleasant vulnerabilities were discovered. Researchers announced these so-called “master keys,” i.e. universal access to any Android device,
The rapid development of the smartphone and tablet market has gone hand-in-hand with an alarming growth in the number and variety of threats targeting these devices. We have a single
Everyday life and online shopping are inseparable. One plastic card allows us to fulfill practically every whim from a pizza to a car, allows us to pay bills and transfer
On the night of June 5, 2013 a coalition led by the FBI and Microsoft broke up a botnet of two million connected PCs that was being used by cybercriminals