Production cars that allow you to race like in a video game
The owners of certain expensive cars can analyze their driving skills in the same way F1 pilots do. However, this information is sensitive and, thus, should be protected.
“Just because you're paranoid doesn't mean they aren't after you” ― Joseph Heller
269 articles
The owners of certain expensive cars can analyze their driving skills in the same way F1 pilots do. However, this information is sensitive and, thus, should be protected.
We have bought our very own Blackphone to check its security firsthand.
Data breaches have become a routine. It can happen to any site, any day. You can’t prevent it, but there is a way to minimize the damage.
Your iPhone runs hidden monitoring services. Who uses them, and for what purpose?
You are probably already aware of recent cybercriminal development, namely encrypting ransomware. This kind of malware doesn’t try to hide from users; instead, a locker encrypts user’s documents using strong
Criminals invented Cryptolocker, spying malware and Zeus banking Trojan. We have new protection against them.
New analysis pinpoints some weaknesses in a new generation of cars with online capabilities. If exploited, this may result in car theft and other problems.
Let’s analyze new safety features in the upcoming Android release while we wait for it to arrive
Kaspersky Lab’s recent research demonstrates that cyber-stealing is a very profitable and well-organized crime.
There were long time rumors about iPhone malware used to spy on smartphone owners, but now it’s official ―Kaspersky Lab researchers discovered a real life sample of this Trojan.
Computer ransomware is getting more sophisitcated, while mobile cryptolockers are emerging both in Europe and the U.S.
Teaching your child the essential codes of conduct on the Internet is as important as teaching them road safety.
What Facebook habits make you vulnerable and how to avoid them.
It’s ridiculously simple to lose your money because of credit card fraud. Secure yourself in all stages―from choosing your card to paying overseas ―using our simple guide.
OpenID and OAuth are protocols responsible for those “Login with Facebook” and “Authorize with Google” buttons you see on almost every site nowadays. Of course, there is a hack for that™, but you don’t need neither panic nor change your password. Read on for our simple action plan.
Top Apps to protect you from prying eyes, mischievous kids, thieves, natural disasters, forgetfulness and of course malware.
Meet our new employee – the Elephant. No kidding! The famous sculpture by Salvador Dali will inspire the Kaspersky team right from the Moscow office lobby.
The concept of mobile malware working in bond with computer Trojans to steal money via online banking is not new, however Kaspersky Lab Q1 report indicates that it quickly gaining “market share”.
Be it Candy Crush Saga, EVE Online, QuizUp or World of Tanks, there are risks associated with your gaming online. Know and avert them.
On October 25, 2001 Microsoft launched its newest operating system solution: Windows XP. In just three days, Microsoft sold over 300,000 boxed XPs: the new OS featured a number of
You have a particularly high chance of encountering fake news on April Fool’s Day. In addition to joking headlines of mainstream media outlets, you can encounter a link to dedicated