
Private Browsing: Enhanced privacy core to new Kaspersky Lab product line
Over the past few weeks, you have more than likely seen our research on Digital Amnesia. It is also quite possibly that you may have forgotten it, given your affliction
480 articles
Over the past few weeks, you have more than likely seen our research on Digital Amnesia. It is also quite possibly that you may have forgotten it, given your affliction
Merely 23 years ago Microsoft released Windows 3.1 operating system, Apple showed its first iPhone PDA, and Linus Torvalds released Linux under GNU license. Eugene Kaspersky published the book with
Please join us in welcoming updated security solutions for consumers — the best what Kaspersky Lab has to offer — Kaspersky Internet Security – Multi-Device and Kaspersky Total Security –
The ‘It wasn’t me’ phrase is not going to fly for users of the Ashley Madison dating site as the personal records of 37 million users have been stolen. Hackers
Connected devices give us access to an unlimited source of information — the Internet. They also serve as a reserve data storage for unmindful owners. Basically, the majority of smartphone
Vitaly Kamluk has more than 10 years of experience in IT security and now he holds the title Principal Security Researcher at Kaspersky Lab. He specializes in malware reverse engineering,
Why would cyber-criminals want to control your Facebook account? At the very least, they could “like” weird things and promote questionable goods and services on your behalf. However, Facebook is
An online password manager can make your life much easier by automatically entering individual passwords for each website and service you visit. It is a very convenient tool – unless
Local governments and law enforcement are becoming increasingly more reliant on networked surveillance cameras in order to monitor densely populated urban areas. London is a notorious example of urban surveillance,
Recently, Apple’s CEO Tim Cook delivered a speech on privacy and security during EPIC’s Champions of Freedom event held in Washington, DC. We want to share with you the 10
Recently Kaspersky Lab experts have found a sly method that allows fraudsters to steal personal information without access to the user’s login and password. The cyber criminals do not try
Threatpost journalists Chris Brook and Brian Donohue discuss security and privacy at Google I/O conference, the IRS and Carefirst BlueCross BlueShield Data Breach, Sections 215 of the PATRIOT Act and
Despite the fact that Google I/O is a developers conference, it always gets the attention of journalists and consumers as well. The reason is simple: this is when Google shows
Updated: Current principles for the processing of user data by Kaspersky Lab security solutions and technologies can be found here. While the cloud-based security approach is not a novelty, it’s
Everyone has heard of the German cipher machine called Enigma, mostly due to the fact its story fascinates all kinds of writers and filmmakers – most recently in the Oscar-nominated
World War II revolutionized many technologies, including those that shaped the modern InfoSec industry. Back then, methods and machines utilizing modern cryptography principles were often coupled with ‘amateur’ ciphering methods.
A group of academic security researchers remotely hacked and took control of a robot designed to perform telesurgery, according to the MIT Technology Review. Telesurgery — perhaps better known as remote
Big data techniques are used to solve numerous problems: to cure rare diseases, catch poachers in India or find the best time to top trees in New York. Insurance agencies
In theory, it’s common knowledge that “there’s no such thing as a free lunch”, but when it comes to practice, some forget about the ‘free lunch’ proverb and prefer another
Fraudsters hacked Skype and tricked people from a contact list to send them about $5,000 over the course of a few days. Skype support, local banks and the police refused to do anything.
#BionicManDiary Entry 003 – The one where I bypassed the smartphone’s password protection whereas had intended to do a completely different thing