Ask the expert: Vitaly Kamluk tells how INTERPOL catches cyber criminals and other stories
Vitaly Kamluk answers our readers’ questions about his work with INTERPOL and other digital investigations.
660 articles
Vitaly Kamluk answers our readers’ questions about his work with INTERPOL and other digital investigations.
Facebook attracts a lot of cyber-criminals. Kaspersky Lab partnered with Facebook to protect you from these cyber-criminals.
At the recent Google I/O conference, the ‘corporation of good’ announced four projects: Soli, Jacquard, Vault, and Abacus. Let’s see what these curious techs are about.
Most of the security announcements surrounding Windows 10 business-oriented, as they address the primary IT security problems businesses have to face. Judging by those announcements, Microsofts seems to address the issues properly.
The web service for secure password storage, LastPass, asks users to change their passwords ASAP.
Devices that have functions of special importance, or that contain top-secret information, are not usually connected to the Internet. However, going offline is not the ultimate protection.
The first technology to enable instant long-distance communication was the telegraph. Back in its time, the telegraph helped to shape many of the current IT infrastructures.
What do a billionaire inventor Elon Musk, the Google Now on Tap service, and the recent “Ex Machina” movie have in common? They all are about artificial intelligence.
The primary issue here is the real cost of free offers. Hola’s stance is almost honest: You want free services? You have something that is of use to us – your idle or not-so-idle resources. If you don’t want them to be used by us, there is a paid tier for you.
Just ten days after the remarkable Google I/O event, Apple is holding its own developers conference. Let’s take a look at the new security features.
We’ve collected the most interesting books and movies which give a lot of detail on how exactly ciphers are solved.
Kaspersky Lab researchers examined one city’s network of surveillance cameras and determined that the systems were not very secure.
Recently, Apple’s CEO Tim Cook delivered a speech on privacy and security during EPIC’s Champions of Freedom event. Here are the 10 best quotes from his speech.
Kaspersky Lab experts detected a sly scheme that allows fraudsters to steal personal data without your login and password.
Tech journalists Chris Brook and Brian Donohue discuss Google I/O, the IRS and Carefirst BlueCross BlueShield Data Breach in this Talk Security podcast.
At Google I/O 2015, the software giant presented a slew of new features and services. We take a first look at customizable app permissions, Android Pay, Now on Tap, and others.
Technology dependence cannot be beaten, but the technologies can be laid out properly. With good system architecture and a proper security policy, the number of bottlenecks is brought to an absolute minimum.
Since the holiday season is upon us, we prepared a list of simple tips to help you minimize risks when renting a car abroad.
While LTE networks are seemingly just now starting to take off, networking vendors and carriers are already fully engaged in a vivid discussion on 5G’s perspectives. What are those next-gen networks going to be and why do we need them at all?
To hackers’ delight, merchant vessels that transfer about ninety percent of the world’s cargo heavily depend on automation and remote monitoring systems with poor IT security.
Much has been said about the VENOM vulnerability, which is part of the new-age phenomena of Virtualization.