
Will an immobilizer save your car from being stolen?
Researchers presented a study on the reliability of modern vehicle immobilization systems at the Chaos Communication Congress.
1247 articles
Researchers presented a study on the reliability of modern vehicle immobilization systems at the Chaos Communication Congress.
Ransomware makers seem to be following a new trend, publishing data from companies that refuse to pay them.
Phishing and business e-mail compromise attacks rely on fake e-mails. But why is it so easy for attackers to make them so convincing?
End of support for Windows 7 is cause to analyze your information infrastructure carefully and identify weak spots.
Web threats are actively used in targeted attacks, so their neutralization should be an integral part of APT defense strategy.
Four steps to reduce your company’s IT carbon footprint — and save money.
Researchers try to modify the contents of a signed PDF file without invalidating the signature.
When training staff, it is not enough to give them the right information; they also have to digest it and remember it.
A Chaos Communication Congress speaker reflects on whether using open-source hardware can solve trust problems in hardware.
Longer product life cycles mean sustainability; shorter ones are easier in terms of support. Which should you choose?
The Brothers Grimm fairy tales are deep source of object lessons in information security — not just for children, but also for adults.
Exploring front-running to capture the Gemini dollar’s antispam stake.
A report on attitudes to information security a long time ago in a galaxy far, far away, as exemplified in Star Wars: Episode IX.
Cybercriminals are attacking small online stores, trying to trick their employees into opening malicious files.
The Kaspersky team has been named a 2019 Gartner Peer Insights Customers’ Choice for Endpoint Protection Platforms, for a third consecutive year.
One explanation of phishing success lies in a known psychological effect.
Our ICS CERT experts found 37 vulnerabilities in four VNC implementations. The developers have fixed most, but not all, of them.
Kaspersky Scan Engine can be integrated with customer or third-party software and hardware solutions.
Outsiders can penetrate your network through LAN sockets and devices in public areas.