What about drones?
On the one hand, drones are bound to violate privacy, whether on purpose or not. On the other, we’ve yet to discover and unleash their full potential.
698 articles
On the one hand, drones are bound to violate privacy, whether on purpose or not. On the other, we’ve yet to discover and unleash their full potential.
Information on how to enter and prize details form part of these terms and conditions. By entering this promotion you are deemed to have accepted these terms and conditions. This
Kaspersky Lab experts analyze the security and privacy trends that emerged in 2014, including anonymous Tor browsing, ransomware, APT attacks and more.
In this Talk Security podcast, Threatpost’s Chris Brook and Brian Donohue discuss the move to encrypt the Web, the Regin APT campaign and more.
Kaspersky LAB and Hitachi Data Systems have partnered to ensure our products work together seamlessly and transparently.
Let’s take a moment to discuss the numerous troubles that our bright, technology-packed future could bring about.
The Electronic Frontier Foundation recently graded a slew of mobile and Internet messaging services based on security and privacy. Here we list the low scorers.
By default, your iPhone’s OS is set to give you the best performance instead of the best battery life. But you can change that!
The Electronic Frontier Foundation recently graded a slew of mobile and Internet messaging services based on security and privacy. Here we detail the top scorers.
The newly disclosed Darkhotel APT campaign will surely draw increased scrutiny to hospitality systems’ security worldwide. Hoteliers acknowledge the existence of security problems in their software systems, and many are opting to move these systems into the cloud. Is this a viable solution?
Kaspersky Lab has just announced the discovery of an alarming APT campaign codenamed “Darkhotel,” targeted mainly at business executives staying at certain hotels in Asia. Luxury hotels offer not just places to stay, but also comfort and privacy. However, their cybersecurity occasionally fails.
Let’s take a look at the security features in the new version of Mac OS X – Yosemite. Apple certainly makes a decent effort.
Apple malware targets iOS by infecting OS X machines and then swapping legitimate apps for malicious ones as soon as an iOS device connects via USB.
Drupal warns customers that they should assume their sites are compromised unless they installed an update from mid-October within hours of the release.
We’re taking a look at the security features in the new version of Mac OS X – Yosemite. Apple makes a decent effort.
Today, users are readily spending their money on house arrest-style services similar to those used for tracking criminals. They call them fitness trackers.
Hotels offer not just free WiFi but occasionally even free use of devices such as iPads these days. While it is really nice, a misconfigured device like this may store just a bit too much personal data, easily retrievable by the next visitor…
Google’s mobile operating system joins Apple’s iOS in offering full disk encryption by default to all users in its newest version — Android 5.0 aka Lollipop.
New research shows that studying and mnemonic devices could help us to better remember our passwords.