#BionicManDiary Entry 003 – The one where I bypassed the smartphone’s password
#BionicManDiary Entry 003 – The one where I bypassed the smartphone’s password protection whereas had intended to do a completely different thing
361 articles
#BionicManDiary Entry 003 – The one where I bypassed the smartphone’s password protection whereas had intended to do a completely different thing
The story of how a biochip was implanted into my hand and why I needed it.
Brian Donohue and Chris Brook of Threatpost discuss Kaspersky Lab’s Security Analyst Summit, which took place last week in Cancun, Mexico
In this talk security podcast, Chris Brook and Brian Donohue discuss the upcoming Security Analyst Summit, Flash zero days, the Ghost vulnerability and the Anthem breach
Security reporters Brian Donohue and Chris Brook discuss security and privacy headlines from the first few weeks of the new year.
Blackhat was finally released in theaters and its strongest aspect is its technological portrayal of hacking.
We have a special solution for multi-device users. If you are using our products on many devices, we recommend you register on the My Kaspersky web portal.
In this Talk Security podcast, Threatpost’s Chris Brook and Brian Donohue discuss the move to encrypt the Web, the Regin APT campaign and more.
Let’s take a moment to discuss the numerous troubles that our bright, technology-packed future could bring about.
In this episode of the Talk Security podcast, Threatpost’s Chris Brook and Brian Donohue discuss the Dark Hotel cyberespionage campaign and the WireLurker Apple malware.
Drupal warns customers that they should assume their sites are compromised unless they installed an update from mid-October within hours of the release.
Brian Donohue and Dennis Fisher talk about a new attack on the SSL protocol, which is now known as POODLE.
September’s security news was dominated by three stories: the Home Depot data breach, the Apple celebrity nude photo leak scandal and the Shellshock vulnerability in Bash.
Elena Kharchenko, Head of Consumer Product Management, answers the important security questions that you submitted.
Tor is an online browsing portal that keeps your web activity completely anonymous.
The Apple iCloud nude celebrity photo fiasco underscores the uncomfortable reality that even the savvy among us aren’t totally sure about what goes on and into “the Cloud.”
Brian Donohue and Chris Brook recap the month’s security headlines from its beginnings at Black Hat and DEFCON, to a bizarre PlayStation Network outage.
Is it even worth applying for popular jobs? The answer is “Yes, absolutely” – as long as you keep in mind a few important points that will help you stand out from the crowd.
In this short video, we will explain six steps you can take to conveniently maximize the security of your PayPal account.
Many recruiters will compare finding the right candidate to finding their mate. It is especially relevant for Kaspersky as we need very special people with unique skills.