Is biometric banking secure?
Biometric identification — using unique physical attributes such as fingerprints to authenticate people — has been considered secure for a long time. As such, the technology is very appealing to
761 articles
Biometric identification — using unique physical attributes such as fingerprints to authenticate people — has been considered secure for a long time. As such, the technology is very appealing to
Kaspersky Lab not only develops security solutions but also helps to catch criminals and creates free decryption tools for ransomware victims. The utilities can be downloaded from the No More
1. Why do I need to read this? This article will help you to protect the money in your bank account. 2. Mobile banking Trojans — what are they? Every
We talk and talk (and talk) about how to behave — and even how to survive — in the digital world. And we hope it’s not in vain, that our
We often advise Android users to download apps from official app stores only. It is much more secure to search for apps on Google Play because all apps in the
Over the past few days, there has been some chatter surrounding Spotify based on a user’s post in the company’s community forum: There’s something pretty alarming going on right now
Every day, new versions and variations of ransomware pop up. Malware creators are still sure that ransomware is their ticket to easy street, despite the fact that law enforcement agencies
Being a parent is tough in the digital age. The bullies and predators you have to worry about have expanded beyond physical threats to ones that lurk around every corner
I am not sure about you, but [sarcasm on] my ABSOLUTE FAVORITE THING is opening my mailbox to find unsolicited mail. You know, junk mail [sarcasm off]. Raise your hand
Researchers at Chinese security company Keen Lab claim that they have managed to remotely hack an unmodified Tesla Model S with the latest firmware installed. After one driver’s interaction with
This report is dedicated to the financial side of cybersecurity: how much businesses spend to protect themselves and to recover from a cybersecurity incident.
Less than three months after Pokémon Go launched, criminals sneaked malware into Google Play to target Pokémon trainers. Our experts discovered the Trojan several days ago and immediately reported it
We frequently advise you to update your operating system and software on a regular basis: Vulnerabilities, unless patched in time, can be exploited by malware. Well, a curious piece of
Sometimes Android users have to download murky apps from Google Play. By “murky” we mean unfamiliar apps, apps from small publishers, and so forth — not the likes of Evernote,
Earlier this week, my colleague Chris from Threatpost penned an article about how Dropbox forced a password reset for users who had not changed their passwords since 2012. At the
Perhaps the biggest problem with cybercriminals is that they are extremely difficult to catch. Think of a real-life bank robbery with guns and face-masks — the thieves leave fingerprints; their
People are more into texting than talking. About 65% percent of us would prefer to have a long and painful conversation via Whatsapp than to have one-minute phone call or
Security experts and media pundits warn people to avoid posting pictures of their tickets online. Many people follow this rule, but not everyone. Time and time again and again, and
Now that even coffee machines are Wi-Fi connected, getting to smart sex toys was only a matter of time. People actually started thinking along those lines quite a while ago:
Imagine someone shut down all of the traffic lights in New York City at 4 pm. That idea has been stuck in my head since Ryan Naraine mentioned it at
Here is a scenario for you: You are walking around, catching Pokémon, getting fresh air, people-watching, taking Fido out to do his business, when something catches your eye. It’s a