659 articles
Ryan Naraine and Juan Andrés Guerrero-Saade discuss the threat landscape and what is being done to prevent major attacks.
VPN’s features and pitfalls from legal and technical standpoint
Journalists and their whistle-blowers managed to keep the biggest data leak in secret. How did they do it?
USA and Canada governments are fed up with the tyranny of ransomware. Experts from both countries analyzed the latest incidents and released an advisory for their citizens.
Eugene Kaspersky discusses how the world can move towards being more secure.
Like all social media platforms, it’s important to ensure you keep your LinkedIn account secure.
This year is the 120th since the invention of a tin foil hat – simple to produce and very efficient information security tool, preventing those warping and state-altering attacks targeted at our minds.
Today is the first annual Tin Foil Hat Day. What is it?
Public studies aren’t there for any kind of fear-mongering, however some cybersecurity-related news really may make one feel uneasy. That’s the case with the Kaspersky Lab’s Global Research & Analysis Team (GReAT) field study of the security of hospitals’ IT systems. As one may have already guessed, the situation there is, let’s say, not good.
Newborn Locky ransomware encrypted patients data in two hospitals in USA. Explaining this new dilemma and how to stop it.
Protect your browser and keep your passwords, card credentials and personal data safe with the help of Kaspersky Protection.
Manufacturers need to change their mindset when it comes to the IoT
2015 proved: it’s possible to hack a connected car remotely. But is it as dangerous as it seems?
Are you sure that one-time SMS passwords reliably protect your mobile bank? Think again! In this article we explain how Trojans fool two-factor authentication.
At the 2016 RSA conference, Kurt Baumgartner spoke on why we need to put some emphasis on security for the transportation industry.
We have previously discussed what VPN is. Now let’s review its implementations and their advantages and drawbacks.
The average American’s data has been stolen several times. Now when it’s done, what would a cybercriminal do next? We have discussed it at RSA Conference 2016.
Find out how to make sure you’re keeping your Tumblr account as secure as possible.
A look at the evolution of mobile threats in 2015 and some predictions for 2016