Make bug bounties great again
Since joining Kaspersky Lab nearly two years ago, I have always seen David Jacoby as one of our company’s more outgoing and jovial researchers. In addition to creating security memes
3298 articles
Since joining Kaspersky Lab nearly two years ago, I have always seen David Jacoby as one of our company’s more outgoing and jovial researchers. In addition to creating security memes
Modern robots are very capable: They can carry heavy loads, jump higher than Olympic champions, walk over rough ground, save lives, protect, and destroy. Smart, useful, dangerous — robots are all that
If you’ve been following along on our blogs or our social media accounts, you probably know that we take a lot of pride in our annual conference, The SAS, hosted by Kaspersky
Macs are commonly believed to be safe from malware, but — setting aside the fact that they aren’t — what about other risks? When it comes to shopping online, phishing
What do you suppose the click-through rate is for links received by men in dating app messages from attractive women? Take a guess — 1%? 5%? 15%? According to research
Drones are everywhere nowadays. Amazon delivers packages by drone. Filmmakers and media workers launch cameras into the air to take attractive wide shots. Some enthusiasts who don’t mind paying $500 or more
Venturing online can be overwhelming in the beginning — even scary, and with good reason. To help beginners explore their PC and the Internet safely, turn on Trusted Applications mode
Considering the sweeping regulations and laws meant to safeguard children’s privacy in particular, you might think electronic devices and connected toys for kids would be particularly safe and secure. We
Last week at Kaspersky Lab’s Security Analyst Summit (the SAS), there was a lot of cool research that made you think. Although a lot of talks centered on deep APT research and
We’ve written a bunch about the insecurity of the Internet of Things (IoT) and connected devices. Many have also wondered how secure voice-controlled home devices like Google Home, Alexa, and
Twice a year, we ask people from all over the world about a variety of things, all having to do with one huge topic: the Internet. We process all of
Apple iPhone and iPad users usually believe they are safe. There’s no malware for iOS, they say. Apple does little to discourage the impression — the “fruit company” doesn’t even
Some time ago we tested FindFace, a service that compares photos with the database of avatars from the VK.com social network and looks for matches. Back then, my colleagues had some
For a great majority of parents, it’s quite reasonable to worry that kids will come across inappropriate websites — or worse — while they’re playing or browsing on an iPhone
For several years the biggest smartphone developer, Samsung, has been heavily promoting the Tizen operating system. This experiment began in 2013, when the market saw two new Samsung cameras that
You might’ve noticed that we are fond of theft by ATM. No, we don’t hack them ourselves, but whenever someone else does, we jump right on the case. At SAS
One soldier does not make a battle, especially in the world of cybercrime, where hidden dangers lurk in the depths of the darknet and occasionally appear topside. There are a
When you are a serious IT company, life is freaking hard, especially on April 1. You are expected to follow the tradition — take some lame idea, cover it as
At this time of year, the number of tax scams reaches a peak, with fraudsters looking for any chance to cash in on consumers, the self-employed, and small businesses that
1. Make backups on a regular basis. 2. Make backups on a regular basis. 3. Make backups on a regular basis. 4. Make backups on a regular basis. 5. Make
1. What is a VPN? From Wikipedia’s current definition: “A virtual private network (VPN) is a virtualized extension of a private network across a public network such as the Internet.”