
Are travel Wi-Fi routers secure?
Last week at Kaspersky Lab’s Security Analyst Summit (the SAS), there was a lot of cool research that made you think. Although a lot of talks centered on deep APT research and
3332 articles
Last week at Kaspersky Lab’s Security Analyst Summit (the SAS), there was a lot of cool research that made you think. Although a lot of talks centered on deep APT research and
We’ve written a bunch about the insecurity of the Internet of Things (IoT) and connected devices. Many have also wondered how secure voice-controlled home devices like Google Home, Alexa, and
Twice a year, we ask people from all over the world about a variety of things, all having to do with one huge topic: the Internet. We process all of
Apple iPhone and iPad users usually believe they are safe. There’s no malware for iOS, they say. Apple does little to discourage the impression — the “fruit company” doesn’t even
Some time ago we tested FindFace, a service that compares photos with the database of avatars from the VK.com social network and looks for matches. Back then, my colleagues had some
For a great majority of parents, it’s quite reasonable to worry that kids will come across inappropriate websites — or worse — while they’re playing or browsing on an iPhone
For several years the biggest smartphone developer, Samsung, has been heavily promoting the Tizen operating system. This experiment began in 2013, when the market saw two new Samsung cameras that
You might’ve noticed that we are fond of theft by ATM. No, we don’t hack them ourselves, but whenever someone else does, we jump right on the case. At SAS
One soldier does not make a battle, especially in the world of cybercrime, where hidden dangers lurk in the depths of the darknet and occasionally appear topside. There are a
When you are a serious IT company, life is freaking hard, especially on April 1. You are expected to follow the tradition — take some lame idea, cover it as
At this time of year, the number of tax scams reaches a peak, with fraudsters looking for any chance to cash in on consumers, the self-employed, and small businesses that
1. Make backups on a regular basis. 2. Make backups on a regular basis. 3. Make backups on a regular basis. 4. Make backups on a regular basis. 5. Make
1. What is a VPN? From Wikipedia’s current definition: “A virtual private network (VPN) is a virtualized extension of a private network across a public network such as the Internet.”
Virtual goods are becoming more and more popular with cybercriminals, who are aiming more and more scams at gamers. Crooks have taken a renewed shine to World of Warcraft, as
It’s true not much malware exists in the wild for MacOS or iOS. But there is some — and phishing sites, spammers, and carders don’t discriminate on the basis of
A long time ago, in the prehistoric digital era, in a world of big trees while we were a mere bonsai, we started throwing a yearly conference for a select
Today we are going to talk about My Kaspersky. This Web portal lets users manage our security solutions on all of their devices remotely. A brief historical note: My Kaspersky grew
Update: The app described in this post is discontinued. Kaspersky Internet Security and Kaspersky Total Security users are familiar with Anti-Banner, a handy component that blocks annoying ads on websites and in
We’ve already posted about Eugene Kaspersky and about a hundred other people being on their way to the Antarctic. Well, neither Eugene nor his travel companions do such things on a
Modern smartphones have way more memory than desktop computers had a decade ago. Out of space? Why bother deleting anything when you can just replace your old 64GB memory card
Back in 2015, a 47-year-old man from the Netherlands became one of the first people to be diagnosed with “digital hoarding disorder.” The man took thousands of digital pictures daily and