
VPN implementations and their peculiarities
In a previous post, we discussed the definition of VPN (Virtual Private Network), its purpose and various use cases. Today we will review its most prevalent implementations, and their advantages
566 articles
In a previous post, we discussed the definition of VPN (Virtual Private Network), its purpose and various use cases. Today we will review its most prevalent implementations, and their advantages
During the 2016 RSA Conference in San Francisco, Kurt Baumgartner, Principal Security Researcher, Global Research & Analysis Team, discussed the need for the transportation industry to put some focus onto
Even if you don’t use it, it’s likely that you’ve heard of the popular microblogging site Tumblr. With its 275 million blogs, Tumblr has become a very popular social network,
Nowadays PCs are protected much better than before. The up-to-date Windows 8.1 comes with a built-in firewall and a type of anti-virus protection delivered via Defender. Browser developers continue to
When the iPhone and app store rolled out, there was a phrase that became ubiquitous to our lives becoming more connected: “There’s an app for that.” Fast-forward to 2016 and
We talk a lot about phishing and how dangerous it is. At times we feel like we may talk about it too much to where people simply say, “yeah, yeah.
Look around — we are living in the Internet of Things. In our day-to-day life, we encounter things connected to the Internet, starting with our home Wi-Fi routers and leading
At the Mobile World Congress 2016 in Barcelona, Eugene Kaspersky and Sandra Alzetta of VISA held a roundtable conversation devoted to the financial security and other related questions. Of course,
Over the past week-plus, we have seen an escalation between Apple and the FBI in regards to unlocking the iPhone belonging to one of the shooters involved in the San
Much like the general population, cybercriminals have areas of expertise. Some grift people on social networks, other spread malware via emails and then there are the ones who know how
It is inevitable that sometime in our lives either illness or injury will send us to the hospital to be cared for by a doctor or team of doctors. While
Believe it or not, math is important. While it may have been easy to roll our eyes at our childhood schoolteachers, human behavior is quite predictable and math helps in
What are social networks usually used for? For the most part, people use them to stay in touch with with friends, watch funny videos or catch with the latest news.
It may only be a few years old, but Snapchat has already become one of the most popular Social Media apps out there. It’s been reported to have over 100
Over the past few months, there has been a lot of hype surrounding Virtual Private Networks or VPN for short. The technology has even found its way into home routers,
Nowadays, it seems like every company has a smartwatch. They can do everything from tracking your heart rate to making phone calls and gasp telling time. But did you know
Installing a security solution is important, however you just cannot assume that you are done there. Keeping your antivirus databases up-to-date is just as important as the initial install. Kaspersky
In the first part of our story we covered the history of SIM cards. Now let us get down to their security. One of the first vulnerabilities in SIM cards
In today’s post, we’ll offer the answers to some questions that Kaspersky Academy fielded to Chief Marketing Officer at Kaspersky Lab, Alexander Erofeev. He will tell us about the role
One thing you might not know about hackers is that besides cracking some virtual systems many of them are fond of hacking real world stuff as well. One thing of
The number of smart devices is constantly increasing and each new product moves us closer to the epoch of the Internet of Things. Today it’s not a problem to buy