
Not everything on the Internet is what it seems
When you hear adults saying, “kids are helpless,” it makes you angry, right? You bet it does even if you are the most self-sustained teen in the history of your
1404 articles
When you hear adults saying, “kids are helpless,” it makes you angry, right? You bet it does even if you are the most self-sustained teen in the history of your
Over the past few weeks, you have more than likely seen our research on Digital Amnesia. It is also quite possibly that you may have forgotten it, given your affliction
Merely 23 years ago Microsoft released Windows 3.1 operating system, Apple showed its first iPhone PDA, and Linus Torvalds released Linux under GNU license. Eugene Kaspersky published the book with
The predictability of human beings can barely be overestimated. This predictability can be easily exploited when it comes to things like passwords, secret words, PIN codes and more. Many of
If hacking were high fashion, this season’s hot trend would be car hacking. Shortly after researchers Charlie Miller and Chris Valasek revealed details on Jeep Cherokee’s breach, another team managed
Security researcher Chris Rock discovered, that it’s very easy to kill a human. We are talking in a legal sense not the one that carries moral and legal consequences. All
Recently we wrote about the now-famous hack of a Jeep Cherokee. At Black Hat USA 2015, a large security conference, researchers Charlie Miller and Chris Valasek finally explained in detail,
History, tradition, passion and belonging to the world of motorsport. The 24 hours of SPA was all that and so much more. Tuesday had begun the first tests, while the
Security experts often mention exploits as one of the most serious problems with data and systems safety; although it’s not always clear what the difference is between exploits and the
Please join us in welcoming updated security solutions for consumers — the best what Kaspersky Lab has to offer — Kaspersky Internet Security – Multi-Device and Kaspersky Total Security –
“Your total is $12.95,”says the cashier at the local supermarket. I take out my wallet to perform a familiar tap on the POS terminal, wait a second, then hear the
29 July is Windows 10’s official launch. Many users of Windows are probably looking to upgrade their operating system to Microsoft’s latest and greatest. If you are one of those
We all know that cybercriminals would love to infect your PC or Laptop with a virus or trick you to install a malware. What you might not know is that
Recently Ericsson and Qualcomm have begun promoting their state-of-art technology, LTE-U. Is it any better that LTE-A, which is increasingly available all over the world, including US, Europe, Russia, China
Oops, they’ve done it again: after two successful breaches into the systems of Toyota Prius and Ford Escape, security researchers Charlie Miller and Chris Valasek have recently hacked a Jeep
I am not a gambler, and it is not too easy to lure me into a dare. Yet, I could not resist it this time. A friend posed this bet
The ‘It wasn’t me’ phrase is not going to fly for users of the Ashley Madison dating site as the personal records of 37 million users have been stolen. Hackers
Recently I had the opportunity to attend the Changellenge Cup Russia 2015 student project competition. I was on the panel of judges for one of the sections. But today we
Cybercriminals are learning from each other. Take TeslaCrypt, for example. It is a relatively new family of ransomware; its samples were first detected in February 2015. The notable feature of
You already know that your game accounts can attract cybercriminals just like the banking credentials of your parents. The Internet can be a dangerous place for those who don’t care about security.
In the beginning of 2015, USA Today launched a wave of publications on a handheld radar called RANGE-R that has been used by the U.S. police and other government services. The radar system