Steam stealers: your account is their target
Hackers are attracted by any web-resource where large amounts of money changes hands, like moths to light. This is what happened with Steam and, according to Valve’s own calculations, 77,000
69 articles
Hackers are attracted by any web-resource where large amounts of money changes hands, like moths to light. This is what happened with Steam and, according to Valve’s own calculations, 77,000
During the 2016 RSA Conference in San Francisco, Kurt Baumgartner, Principal Security Researcher, Global Research & Analysis Team, discussed the need for the transportation industry to put some focus onto
The morning of November 24, 2014 is engrained into the collective memories of Sony Pictures Entertainment employees. On that day, an unknown cybergang hacked the company’s server, leaked a slew
Every year Kaspersky Lab products take part in a number of short- and long-time tests that are held by independent laboratories. It’s no secret that our solutions continually show high
Long gone are the days when hackers would make malware just for fun. Nowadays malware is there not to simply cripple a PC, as it once was, but rather to
At the Security Analyst Summit 2016 our Global Research and Analysis Team (GReAT) has published extensive research on the Adwind Remote Access Tool (RAT). This malicious tool is also known
What are social networks usually used for? For the most part, people use them to stay in touch with with friends, watch funny videos or catch with the latest news.
Nowadays, it seems like every company has a smartwatch. They can do everything from tracking your heart rate to making phone calls and gasp telling time. But did you know
What is an exoplanet? A common definition is ‘an Earth-like planet.’ However popular this definition may be, the true definition of an exoplanet is ‘any planet orbiting a star other
There is no decent alternative to passwords, especially when it comes to protecting your email, personal finances and devices that store your personal data. That’s why it’s crucial to use
Each year the number of people “addicted to Internet” grows rapidly. We can read news, communicate with friends, look through photos and videos right from our smartphones. It’s only logical,
Turla APT group, also known as Snake and Uroboros, is one the most advanced threat actors in the world. This cyber espionage group has been active for more than 8 years,
The predictability of human beings can barely be overestimated. This predictability can be easily exploited when it comes to things like passwords, secret words, PIN codes and more. Many of
If hacking were high fashion, this season’s hot trend would be car hacking. Shortly after researchers Charlie Miller and Chris Valasek revealed details on Jeep Cherokee’s breach, another team managed
Security researcher Chris Rock discovered, that it’s very easy to kill a human. We are talking in a legal sense not the one that carries moral and legal consequences. All
Oops, they’ve done it again: after two successful breaches into the systems of Toyota Prius and Ford Escape, security researchers Charlie Miller and Chris Valasek have recently hacked a Jeep
Local governments and law enforcement are becoming increasingly more reliant on networked surveillance cameras in order to monitor densely populated urban areas. London is a notorious example of urban surveillance,
Tech giants Intel and IBM are seeking to hire Bitcoin experts, but their interest appears to be focussed on the service’s public ledger rather than the cryptocurrency itself
Scientifically proven: video games may really boost your intellectual abilities.
“All the things I really like to do are either immoral, illegal, or fattening.” As always, there are exceptions.
Researcher discovers that Progressive Snapshot tools lack any real security controls and could be exploited by attackers to hack cars.