An Interview with Kaspersky Lab intern David Nasi
David, it seems like it was just yesterday that I walked you to your desk and showed you around Kaspersky Lab. Since then, two months have passed, and your internship
3297 articles
David, it seems like it was just yesterday that I walked you to your desk and showed you around Kaspersky Lab. Since then, two months have passed, and your internship
I would like to start this week’s new edition of Security Week with news that has nothing to do with information security. Volkswagen diesel vehicles happened to be emitting far
Despite our dismay in how much of a presence computers have in our kids’ lives (in all senses of the word), it is an unavoidable part of our evolution that
Hey there! Today’s post will cover something that is vitally important, but often considered irrelevant – the necessity to comply with system requirements. Software developers often cite on packaging and
A worm was found in the safe garden of Apple. About 40 iOS apps are now being cleaned out of the App Store because they turned out to be infected
Do you consider yourself cyber-literate? Have you been so immersed in the online life so you can tell what’s real and what’s fake? We recently decided to test our reader’
“Three billion human lives ended on August 29, 1997. The survivors of the nuclear fire called the war Judgment Day. They lived only to face a new nightmare: the war
Surveillance cameras are everywhere today: outdoors and indoors, at airports, railroad stations, offices, and shops. You cannot escape the all-seeing eye of the cameras even in the wild, making George
On Monday 14, September, the Dutch police arrested two young men, 18 and 22 years old, from Amersfoort, the Netherlands. The duo is suspected of attacking users PCs with the
The World Junior Chess Championship in Khanty-Mansyisk has come to an end. The final was extremely intriguing, keeping Russian fans on the edge of their seats until the end. Italy
In fact, it’s the one of the most widely believed myths in the infosec world. At the same time, it’s the most non-standard one. That double-sided nature is likely the
In the new installment of our explosive hit series “Infosec news”: The breach of Bugzilla serves a harsh reminder of the necessity to make passwords BOTH strong and unique. The
The majority of ciphers referenced in historical or fiction works belong to the same family of ciphers — monoalphabetic ciphers. We have already dove into the main vulnerability of this
When you search, watch, read, or purchase anything online, the information on your clicks, search inputs, visited websites, or purchases article is logged. This data is available to both website
Turla APT group, also known as Snake and Uroboros, is one the most advanced threat actors in the world. This cyber espionage group has been active for more than 8 years,
The new trend on IFA 2015 — a trade show for consumer electronics — is all about innovations in technological integrity. Developers chase after hardware superiority no more; instead they
Our lives will be smooth once PCs are embedded into our brains. Text messages will be replaced by ‘mentalgrams,’ whispered to us subtly by our inner voice. Has a bright
While iOS is notorious for being innately secure, headlines over the past three days have challenged that. The noise was brought upon by a ‘terrible’ KeyRaider hack, which compromised more
The Ashley Madison scandal reached its peak when hackers published private users data on the darknet. Allegedly two suicides followed the incident and the sticky situation turned out to be
“Sensation!! Buy this super-effective anti-freckle treatment!” “The only way to battle nightmares for good!!” “Unique diet!! Just stop eating these 5 products…” – I won’t even dare to ask if
Nowadays parents are getting more and more concerned about what you do on the Internet. They know that there are lots of creepy weirdos and malicious viruses on the Internet;