
Hacking air conditioners leads to the whole block’s blackout
At the Security Analyst Summit 2016 Vasilios Hioureas from Kaspersky Lab and Thomas Kinsey from Exigent Systems revealed how anybody with $50 in their pocket can hack one of their
3358 articles
At the Security Analyst Summit 2016 Vasilios Hioureas from Kaspersky Lab and Thomas Kinsey from Exigent Systems revealed how anybody with $50 in their pocket can hack one of their
Every year Kaspersky Lab products take part in a number of short- and long-time tests that are held by independent laboratories. It’s no secret that our solutions continually show high
Automated teller machines (ATM) have always a been a big target for criminals. In the past hunting for ATMs included some heavy tools like a cutting torch or explosives. However
Much like the general population, cybercriminals have areas of expertise. Some grift people on social networks, other spread malware via emails and then there are the ones who know how
You can literally find anything on the Internet; unfortunately this includes bad guys. There are thousands of ways to deceive an Internet user ranging from legal to illegal – some
The SAS has come and gone. A lot of great knowledge was dropped during the conference including insights on Poseidon, Adwind and Metel. As we come back to reality, we
It is inevitable that sometime in our lives either illness or injury will send us to the hospital to be cared for by a doctor or team of doctors. While
Believe it or not, math is important. While it may have been easy to roll our eyes at our childhood schoolteachers, human behavior is quite predictable and math helps in
Mike Mimoso of Threatpost sat down with Vitaly Kamluk of our Global Research and Analysis Team during the Security Analyst Summit 2016 to discuss the latest discovery of the cross-platform
Long gone are the days when hackers would make malware just for fun. Nowadays malware is there not to simply cripple a PC, as it once was, but rather to
At the SAS 2016, Kaspersky Lab’s GReAT team unveiled how dozens of banks lost millions of dollars via APT tools. We know that the blogs were a tad long so
At the Security Analyst Summit 2016 our Global Research and Analysis Team (GReAT) has published extensive research on the Adwind Remote Access Tool (RAT). This malicious tool is also known
In 2015 we saw the rise of cybercriminals who rob banks directly. Several groups have mastered APT tools and techniques, dipping their hands into the “pockets” of at least twenty-nine
Chances are that your kids use at least one or more devices that are tied to the Internet. It is also likely that you want to limit the amount of
April 15 is a day that lives in infamy in the hearts of Americans. Now this date is not significant for any holiday, but rather the day that the Tax
What are social networks usually used for? For the most part, people use them to stay in touch with with friends, watch funny videos or catch with the latest news.
Since the dawn of mankind, our species has been full of dreamers with a quest for unlocking the unknown. Through the years, we searched for it in alchemy, ancient rituals
3D-printing is a unique technology — it lets you produce almost anything quickly and accurately. Moreover, items can be printed using different materials like plastic, metal, wax and so on.
It may only be a few years old, but Snapchat has already become one of the most popular Social Media apps out there. It’s been reported to have over 100
Over the past few months, there has been a lot of hype surrounding Virtual Private Networks or VPN for short. The technology has even found its way into home routers,
While identity theft is something that we all know is scary, people generally are more passive with protecting their digital identity. However recent trends of breaches and stolen personal data