A 30-year cybermaze, from the Cascade virus to recent days
A pixel-art infographic with 30 years of information security developments, from the Cascade virus to the most recent days.
16 articles
A pixel-art infographic with 30 years of information security developments, from the Cascade virus to the most recent days.
How one of the key technologies behind the Kaspersky Lab’s antivirus engine came to be.
Twenty years’ worth of the most important events in the cybersecurity industry and Kaspersky Lab’s history.
Cryptography and ransom have roots deep in human history. However, only in the past few decades has the world seen what can happen when someone combines them. It started in
You might remember our slogan — it’s all about saving the world, with words, deeds, and sometimes an inspired combination of both. But saving the world is a complicated task
A recent story suggests Google is secretly recording your conversations and discussions. Although the story does have merit, it also has some problems. Google is recording voices; that’s entirely true.
How long has it been since you were last alone? Probably never! Even within the walls of your skull you’re never really alone. For enemies are everywhere — since time
In the first part of our story we covered the history of SIM cards. Now let us get down to their security. One of the first vulnerabilities in SIM cards
A SIM card, or Subscriber Identity Module is a familiar element of a mobile phone. It can be easily swapped or replaced, yet, it was not born at the same
The majority of ciphers referenced in historical or fiction works belong to the same family of ciphers — monoalphabetic ciphers. We have already dove into the main vulnerability of this
Every time you speak about how the great revolution in the principles of data transmission and the information security principles was sparked by the Internet, make sure to remember one
Ciphers, codes, and passwords appear quite often in stories, novels, and films of the mystery, spy and adventure genres. As a rule of thumb, writers and filmmakers do not reveal
The so-called book cipher has always been in favor with authors of spy novels and detective stories, who usually try to mimic reality but are not ready to feed hardcore
Everyone has heard of the German cipher machine called Enigma, mostly due to the fact its story fascinates all kinds of writers and filmmakers – most recently in the Oscar-nominated
World War II revolutionized many technologies, including those that shaped the modern InfoSec industry. Back then, methods and machines utilizing modern cryptography principles were often coupled with ‘amateur’ ciphering methods.
In the days of cyberwars and cybermafia, it’s hard to recall times when computer viruses and worms were just research projects or pranks. Back then, there were no monetary incentive