How to protect yourself from cloud service leaks
Don’t want your private photos or credit card posted somewhere on the web? You should rethink your approach to cloud services then.
1115 articles
Don’t want your private photos or credit card posted somewhere on the web? You should rethink your approach to cloud services then.
Brian Donohue and Chris Brook recap the month’s security headlines from its beginnings at Black Hat and DEFCON, to a bizarre PlayStation Network outage.
Is it even worth applying for popular jobs? The answer is “Yes, absolutely” – as long as you keep in mind a few important points that will help you stand out from the crowd.
Beware of phishing, malware, spam and other online scams based on the extremely popular ALS Ice Bucket Challenge.
It would be nice to think that it would take a lot more than an overeager amateur hacker like Seth Green’s character from the 2003 movie “The Italian Job,” to bring traffic to a screeching halt.
Community Health Systems breach exposes the Social Security numbers of 4.5 million patients. Were you a victim? If so, how do you react?
We have bought our very own Blackphone to check its security firsthand.
A recap of last week’s security news and research from the Black Hat hacker conference in Las Vegas, Nevada.
Yahoo plans to implement end-to-end encryption for all of its mail users, giving normal, non-technical users the power to communicate securely and privately.
Many recruiters will compare finding the right candidate to finding their mate. It is especially relevant for Kaspersky as we need very special people with unique skills.
Car hacking is back and Charlie Miller and Chris Valasek no longer have to plug their computers into the cars to make them do their bidding.
Data breaches have become a routine. It can happen to any site, any day. You can’t prevent it, but there is a way to minimize the damage.
July is over and that means it’s time to look back and observe the latest results of the battle between cybercriminals and prosecutors.
In the news this week: more APT campaigns, a look forward at the DEF CON and Black Hat Hacker conferences, and good and bad news for Facebook.
In the news: Microsoft’s No-IP takedown fiasco, Chinese APT groups curious about U.S. Iraq policy, Verizon says the government wants locations data, and Microsoft denies backdoor insinuations.
Your iPhone runs hidden monitoring services. Who uses them, and for what purpose?
Facebook fails to fully encrypt data on its Instagram mobile app, which puts user security and privacy at risk.
School’s out for summer and the kids need watching. Here are some tools that can help you do the job – at least while they’re on the Internet.
Know your sysadmin and what to expect from him. Don’t forget to congratulate the guy, today is Global Sysadmin day!
A new version of file-encrypting malware hides its sever inside an anonymous TOR network, making it safer for criminals to extort money from victims.