
Taxi Trojans are on the way
Android Trojans have been mimicking banking apps, messengers, and social apps for a while. Taxi-booking apps are next on the list.
3945 articles
Android Trojans have been mimicking banking apps, messengers, and social apps for a while. Taxi-booking apps are next on the list.
The essence of the HuMachine concept is a fusion of big data, machine learning, and our analysts’ expertise. But what is behind these words?
Black Hat 2017 demonstrated that Microsoft enterprise solutions could be quite useful in attackers’ hands.
Can you be sure the encrypted USB drives you’re using won’t reveal your company’s secrets to hackers? Problem is, current certifications can’t guarantee it.
Microsoft changes its approach to cybersecurity solutions in response to partner feedback
Facebook’s Alex Stamos explains why the information security industry has the wrong priorities and what should be done about it.
A hacker connects a mysterious device to a lock, picks its code within a few seconds, and unlocks the door. That’s how it always happens in the movies, but is it the same in real life?
At the Black Hat conference, researchers demonstrated that typing on the keyboard while talking on Skype is not safe.
Assembly robots are made with physical safety in mind, but hacking these machines is still frighteningly easy
For the past 20 years, Kaspersky Lab has been saving the world. This e-book shares business best practices that the company has learned over the past two decades.
Just when you think you have seen everything hacked, Black Hat comes along and shows you that a car wash can be hacked.
On July 25 – for our 20th birthday – Kaspersky Free will start being officially launched!
Let’s have a quick look at some of the more curious and fun aspects of the company over the years — how it was in the ‘good old days’, how it looks now, and how it’ll be in the future.
Who is mining cryptocurrency such as bitcoins — and where have all the graphics cards gone?
What a troubleshooting report is and how to create one.
Even those who are responsible for arranging security awareness training may not solidly understand what cybersecurity training is, or even why the training is needed.
Do you know enough about DDoS attacks to ensure your company never faces one? Take our quiz and find out!
Kaspersky Internet Security prevents eavesdropping through a computer microphone. Here’s how it works.
Global IT security problems like the recent Petya attack are of clear concern to large corporations — but they affect common people as well.