3897 articles
Using the Machine-Readable Threat Intelligence Platform fits well with our general position on security: multilayeredness everywhere.
Yahoo is expected to announce a “massive” data breach soon. Although the news is not yet confirmed, you should be proactive and check the security of your Yahoo account.
What is the fundamental difference between Auto 2.0 and Auto 3.0? Technically, they’re the same. From the viewpoint of the car owner, however, the connection of one or more electronic units to the Internet provides pleasant and useful services — as well as Internet access while en route. But to a cybersecurity expert, the difference is huge: remote access to a car and its internal systems is bound to have major consequences.
When Google announced Allo, we thought the search giant was finally paying attention to users’ concerns about privacy. Reality turned to be quite different.
We have developed a distinct solution to provide information security tailored specifically for SMBs — Kaspersky Endpoint Security Cloud.
Security researchers claim that they have managed to remotely hack an unmodified Tesla Model S with the latest firmware installed.
How heuristic analysis and System Watcher work in Kaspersky Internet Security.
Why questions like “What is your mother’s maiden name?” and “What did you do last summer?” don’t protect you.
Our experts recently discovered an app called Guide for Pokémon Go distributed via Google Play. It looks like a single app created to help players of the much-hyped gaming title. But a little while after it’s installed, the app roots the device. Rooting makes the malware capable of installing and deleting additional apps.
We discovered a Pokémon Go Trojan in Google Play. It had already been downloaded 500,000 times.
For the pilot of our “The daily life of…” series, we filmed David Jacoby — at home and out about town
Kaspersky Lab’s senior vice president of IT dispenses essential cybersecurity advice for small businesses.
The field of cybersecurity is facing a talent shortage. Our new Dublin office is here to help.
What if you have to transmit sensitive data and the only connection is open Wi-Fi? We’ve got you covered.
Confused and wondering how Bitcoin and blockchain work? In this post we break it all down for you.
We asked more than 3,000 representatives of small and medium-sized companies how they manage to cope with cryptomalware in the constantly changing landscape of cyberthreats.
What do people consider more important, their smartphones or their relatives? The answer is in the video, and it may surprise you
After many years of working with clients trying to protect their industrial systems you learn one thing: critical infrastructure needs special attention.
Digital advertising brings money to companies and relevant ads to you and me — and attracts fraud. How does it all work?
The emergence of robocars could mean the end of personal vehicles as we know them. Here’s how things may go down.