Digital device searches at the border: 11 tips for safe travel
Do border agents have the right to search your devices? How can you protect your data from searches at the border? We have 11 tips covering this topic.
58 articles
Do border agents have the right to search your devices? How can you protect your data from searches at the border? We have 11 tips covering this topic.
Do you use NAS for backup? We’ll tell you how to protect it from new threats
Some habits, at first glance, seem to have nothing at all to do with security. However, looks can be deceiving.
Our security experts zeroed in on the state of targeted attacks in APAC countries from past to present and how governments, businesses, and concerned industrial sectors can beef up their cyber defenses at 2017 APAC Cyber Security Weekend in Phuket.
What if you could pay with your personal data for goods – as if it was some sort of currency? Sounds attractive… or scary?
Transatlantic Cable Podcast episode 4: tax scams, trading data for swag, AI password cracking, and more.
The amount of personal data leaked by companies that store or process it has been growing at an alarming rate over the past few years. Yahoo’s record-breaking 2016 data breach —
1. Make backups on a regular basis. 2. Make backups on a regular basis. 3. Make backups on a regular basis. 4. Make backups on a regular basis. 5. Make
Back in 2015, a 47-year-old man from the Netherlands became one of the first people to be diagnosed with “digital hoarding disorder.” The man took thousands of digital pictures daily and
Nowadays the proverb “the walls have ears” is not as metaphoric as it used to be. “The telescreen received and transmitted simultaneously. Any sound that Winston made, above the level
You’ve probably heard the word botnet more than once recently, and that’s hardly surprising. Any connected device can be zombified — turned into a part of a botnet. These include
Our bionic man, Evgeny Chereshnev, had a chance to speak at a TedX event in Kazan. During his 17-minute talk, he discussed what he has learned from having a biochip
Last week, our bionic man, Evgeny Chereshnev, headed to Kazan to speak at a TedX event. During his 17-minute talk, he discussed what he has learned from having a biochip
Kaspersky Lab not only develops security solutions but also helps to catch criminals and creates free decryption tools for ransomware victims. The utilities can be downloaded from the No More
Has the shock and awe of Yahoo’s 500 million user credential hack died down yet? Everyone breathing a bit easier? Passwords changed, dead accounts deleted? For those of you chuckling
Everyone from citizens to corporations to special services and government organizations is fed up with ransomware. With all of the potential victims, the United States and Canada released a joint
Doctors and patients across the world, beware: cyberciminals have a new member of the family! Despite its young age, a one-month-old ransomware has already encrypted files in two American hospitals
Today a smartphone has become an integral part of our life. We constantly use phones for work, study, travel, and they are increasingly starting to know more about us than
Ransomware has become one of the most notorious cyberthreats. Once a ransomware Trojan infiltrates your system, it stealthily encrypts your files, including your valuable documents, videos and photos. This entire