Eyes in the sky: Israel Defense Forces drones
Information security is the cornerstone and essence of Israel. It was given serious attention long before the term of information security emerged in its traditional meaning in the 21st century.
558 articles
Information security is the cornerstone and essence of Israel. It was given serious attention long before the term of information security emerged in its traditional meaning in the 21st century.
SAN FRANCISCO — It’s an utterly played out platitude that the security industry is largely failing at its mission to protect computers and networks and all the nearly infinite data
Recently the United States Government Accountability Office published a report warning the Federal Aviation Administration that aviation faces cybersecurity challenges in “at least three areas”, including the protection of aircraft avionics used to
World nations are building fleets of unmanned robotic boats to perform missions above, on and under the water. Though there are only a few hundred unmanned maritime vessels in operation
Big data techniques are used to solve numerous problems: to cure rare diseases, catch poachers in India or find the best time to top trees in New York. Insurance agencies
Many people still think that malware is a software that completely disrupts the normal functioning of PCs. If your computer is working well, it means it’s not infected, right?
In theory, it’s common knowledge that “there’s no such thing as a free lunch”, but when it comes to practice, some forget about the ‘free lunch’ proverb and prefer another
Tech giants Intel and IBM are seeking to hire Bitcoin experts, but their interest appears to be focussed on the service’s public ledger rather than the cryptocurrency itself
In 2014 Kaspersky Lab products took part in many tests held by independent research labs. Our solutions achieved more first places than any competitor!
Fraudsters hacked Skype and tricked people from a contact list to send them about $5,000 over the course of a few days. Skype support, local banks and the police refused to do anything.
Windows 10 will offer users the ability to authenticate themselves with biometric identifiers rather than passwords
#BionicManDiary Entry 003 – The one where I bypassed the smartphone’s password protection whereas had intended to do a completely different thing
A Trojan malware called Podec uses popular Russian social network VKontakte, and other channels, to infect Android phones. Beware: It can bypass CAPTCHA.
Kaspersky Lab created a mobile app to find a stolen or lost phone, remotely lock it, or delete sensitive data in case of device theft.
Samsung Pay is set to come out in South Korea and the U.S. this summer. The company isn’t saying much, but we tried to find out what we could about security on the platform
Let’s identify the main IT security and protection trends at MWC 2015.
During my first two weeks of the biochip experience I had time to mull over a lot of things. In this post I’m going to touch upon the subject of form factor.
The story of how a biochip was implanted into my hand and why I needed it.
Brian Donohue and Chris Brook of Threatpost discuss Kaspersky Lab’s Security Analyst Summit, which took place last week in Cancun, Mexico
It turned out that Lenovo’s laptops had been shipped with an adware called Superfish. It possibly allows eavesdropping on encrypted connections.
The Carbanak APT group managed to steal a total of $1 bln from dozens of banks worldwide