The continual evolution of mobile malware
A look at the evolution of mobile threats in 2015 and some predictions for 2016
660 articles
A look at the evolution of mobile threats in 2015 and some predictions for 2016
While many mobile applications serve as a mere distraction, these apps can help simplify or streamline your daily life.
Over the weekend, Snapchat was compromised via a phishing email pretending to be from company CEO.
Shodan and Censys are the search engines for the Internet of Things and this duo is capable of wreaking havoc in a lot of different ways
The only way to ensure the security of online payments is to be at least one step ahead of the cybercriminals, and that can be achieved only by improving the technology.
Why Steam users often fall victims to scams and frauds and how to avoid it.
Sooner or later each user of the internet will face a trick or trap. Here’s the list of the most widespread ones. Forewarned is forearmed!
At SAS 2016 Sergey Lozhkin revealed how he hacked his friend’s hospital and medical equipment.
Observing cybercriminals’ behaviour one can find consistent patterns and thus find out who the criminal is in real life
Cybersecurity isn’t something that should fall exclusively with CISOs and IT pros. Rather it is something that impacts employees from the mailroom to the cushy corner office.
Kaspersky Lab’s research shows that some users are too eager to share everything they have when it comes to social networks
The rise of Snapchat has brought a whole host of security issues regarding the app. Make sure your account is secure.
What exactly is a VPN? There has been a lot of buzz around it, but why do we need it?
The Hyatt hotel chain has revealed recently that 250 of 627 of its properties worldwide were infected with money-stealing malware.
Researcher shows that using data from motion sensors built into a smartwatch one can recognize numbers you press on a numpad. How can that affect your security?
How to resolve database update issues with your Kaspersky security solution.
Vendors claim, that a fingerprint sensor in your smartphone is user-friendly and really secure. But it’s not true.
SIM cards can be cloned. How is it possible and what does it have to do with cybercriminals?
Alexander Erofeev talks on who is the most interested in IT security knowledge, on life without technology and on predictions of the Internet existence.
At the Chaos Communication Congress a university professor tells how to forge keys using a 3D printer and we come up with a few tips how to protect yourself from that