Previewing Black Hat 2022
A look at what experts at Kaspersky will be watching during Black Hat 2022.
38 articles
A look at what experts at Kaspersky will be watching during Black Hat 2022.
We explain for laypeople what end-to-end encryption is and how it enables private, secure communication for us all.
Researcher Patrick Wardle has demonstrated how a chain of exploits can be successfully used to attack macOS Catalina.
When calculating potential losses from cyberincidents, statistical data is just as important as its interpretations.
A lightbulb is all the specialist equipment Lamphone needed to eavesdrop on a conversation in a soundproofed room.
A preview of Black Hat 2020 with Eugene Kaspersky, Kurt Baumgartner, and Costin Raiu.
Which is older, the phone or the fax? Is it true that no one faxes anymore? And can a fax machine be hacked? (Spoiler: yes)
Due to certification centers specifics, it is not rare for other people to hold a valid HTTPS certificate for your domain. What can go wrong?
How a seemingly harmless Android application can infect your smartphone using shared external storage.
Are the IoT’s security issues placing the industry on the road to a litigation nightmare?
When it comes to online accounts, voicemail is a major security hole. Here’s why.
The 50th edition of the Kaspersky Lab podcast looks into the latest in Google tracking, spam, and hacking ATMs and police body cameras.
How security researchers were able to track down cryptocurrency bots on Twitter.
In this podcast, we sit down with Kaspersky Lab Global Research and Analysis Team member Ido Naor to discuss his upcoming talk at Black Hat.
Black Hat 2017 demonstrated that Microsoft enterprise solutions could be quite useful in attackers’ hands.
Can you be sure the encrypted USB drives you’re using won’t reveal your company’s secrets to hackers? Problem is, current certifications can’t guarantee it.
Facebook’s Alex Stamos explains why the information security industry has the wrong priorities and what should be done about it.
A hacker connects a mysterious device to a lock, picks its code within a few seconds, and unlocks the door. That’s how it always happens in the movies, but is it the same in real life?