
Breaking electronic locks — just like in those hacker movies
A hacker connects a mysterious device to a lock, picks its code within a few seconds, and unlocks the door. That’s how it always happens in the movies, but is it the same in real life?
3332 articles
A hacker connects a mysterious device to a lock, picks its code within a few seconds, and unlocks the door. That’s how it always happens in the movies, but is it the same in real life?
Microsoft changes its approach to cybersecurity solutions in response to partner feedback
Kaspersky Anti-Targeted Attack: 100% threats detected with 0 false positives in ICSA Labs certification test.
Assembly robots are made with physical safety in mind, but hacking these machines is still frighteningly easy
For the past 20 years, Kaspersky Lab has been saving the world. This e-book shares business best practices that the company has learned over the past two decades.
We hope that you find these five papers helpful in building out training for your staff
Just when you think you have seen everything hacked, Black Hat comes along and shows you that a car wash can be hacked.
On July 25 – for our 20th birthday – Kaspersky Free will start being officially launched!
Who is mining cryptocurrency such as bitcoins — and where have all the graphics cards gone?
Twenty years’ worth of the most important events in the cybersecurity industry and Kaspersky Lab’s history.
Can I interest you in a nice, long, legally binding document? It’ll only take a few hours and maybe a law degree. No? You’re not alone.
Even those who are responsible for arranging security awareness training may not solidly understand what cybersecurity training is, or even why the training is needed.
What a troubleshooting report is and how to create one.
Do you know enough about DDoS attacks to ensure your company never faces one? Take our quiz and find out!
Global IT security problems like the recent Petya attack are of clear concern to large corporations — but they affect common people as well.
Major pain: Critical infrastructure objects are among ExPetr’s (also known as NotPetya) victims.
Just a few hours ago, a global ransomware outbreak began, and it looks to be as big as the WannaCry story that broke not so long ago.
We conducted a global survey of 359 industrial cybersecurity practitioners to learn more about perceptions and realities.
A lot of ads on the Internet promote easy ways to earn money. They tend to lead to fishy places — say, a post from an alleged mother of three