Six simple cybersecurity rules for all ages
Nowadays parents are getting more and more concerned about what you do on the Internet. They know that there are lots of creepy weirdos and malicious viruses on the Internet;
104 articles
Nowadays parents are getting more and more concerned about what you do on the Internet. They know that there are lots of creepy weirdos and malicious viruses on the Internet;
Abuse of big data means your worst paranoia scenarios come true, including, among other things, the endless government surveillance, insurance agencies despotism and employers tyranny. Like it or not, the
Ashley Madison’s unplanned affairwith a group of hackers did not succeed. On August 18, 2015 the hackers posted nearly 10-gigabytes of stolen data online. Now anyone can download the records
If hacking were high fashion, this season’s hot trend would be car hacking. Shortly after researchers Charlie Miller and Chris Valasek revealed details on Jeep Cherokee’s breach, another team managed
Oops, they’ve done it again: after two successful breaches into the systems of Toyota Prius and Ford Escape, security researchers Charlie Miller and Chris Valasek have recently hacked a Jeep
The ‘It wasn’t me’ phrase is not going to fly for users of the Ashley Madison dating site as the personal records of 37 million users have been stolen. Hackers
Connected devices give us access to an unlimited source of information — the Internet. They also serve as a reserve data storage for unmindful owners. Basically, the majority of smartphone
Why would cyber-criminals want to control your Facebook account? At the very least, they could “like” weird things and promote questionable goods and services on your behalf. However, Facebook is
Merchant vessels are continuously becoming bigger and getting more electronic systems. Seafarers often depend on technology data more than their own skills, knowledge, and senses. Crews are becoming smaller as computer
World nations are building fleets of unmanned robotic boats to perform missions above, on and under the water. Though there are only a few hundred unmanned maritime vessels in operation
Big data techniques are used to solve numerous problems: to cure rare diseases, catch poachers in India or find the best time to top trees in New York. Insurance agencies
There are many cool and funny projects in the world that deal with big data and we’ve gathered the Top 10 list of the most interesting ones. See for yourself!
In 2014 Kaspersky Lab products took part in many tests held by independent research labs. Our solutions achieved more first places than any competitor!
A Trojan malware called Podec uses popular Russian social network VKontakte, and other channels, to infect Android phones. Beware: It can bypass CAPTCHA.
Kaspersky Lab created a mobile app to find a stolen or lost phone, remotely lock it, or delete sensitive data in case of device theft.
As is, a QR code can quickly take you to a site or another resource but not necessarily to the one you really want to visit. Thus Kaspersky Lab offers a free and safe QR scanner!
The top privacy data leaks in 2014 include: data breaches at Target and Home Depot, hacks of JP Morgan and Barclays banks, and leaks at Orange and Dropbox.
Gaming is enormously popular. Thus, it’s an easy target for cybercriminals looking for a never-ending source of money.
We have constructed a list of promises that you should make to yourself this year to stay safe both online and offline.
Anyone who goes online could be hacked. During Christmas time, this possibility doubles as we make a number of purchases and get so excited that we forget about security.