Inside The Belly of a Cybercrime Investigation
Whenever you read a news headline about the arrest or conviction of a cybercriminal, you can guarantee that the bulk of the investigative work was done by the work of
1110 articles
Whenever you read a news headline about the arrest or conviction of a cybercriminal, you can guarantee that the bulk of the investigative work was done by the work of
Crime in the virtual world has long been a tough nut to crack for law enforcement agencies and the courts. Getting to the bottom of a cyberattack and then gathering
The federal government is typically a step behind when it comes to regulating the Internet, but in a timely and significant move the Federal Trade Commission issued a report recently
Recently Eugene Kaspersky wrote in his blog a post about the so called Big Comeback of old-school virus writers. I am old enough to remember those guys and their brilliant
The number of those affected by identity theft is on the rise again according to recent research. A quarter of consumers that received data breach letters last year wound up
The overwhelming majority of businesses today are encouraging employees to adopt “mobile” working practices, meaning that work can be done wherever, whenever and from whatever device – smartphone, tablet or
RSA is like the Hogwarts of Security, the annual reunion for cyber jedi masters or the secret fight club for private security companies, governmental agencies and international organizations. We’ve got
RSA is the major event in security. Basically it’s like the Big 8 International Conference or, better yet – the Olympics of security – except nobody is throwing spears and
The Mobile World Congress, which is currently under way in Barcelona, is the world’s premier telecoms industry event. It’s the place where the most important announcements are made on issues
Three young researchers have made their mark on the cybersecurity world and will now present their work at the final of the ‘CyberSecurity for the Next Generation’ student conference in
Social networks have become major targets for attackers, who value the implied trust that users have in their friends’ accounts. Compromising a large number of accounts on one of the
Young researchers, original security projects, making contacts among your peers, and a stepping-stone into the professional community – these are the key ingredients of Kaspersky Academy’s ‘CyberSecurity for the Next
Does Kaspersky write malware or create cyberweapons? Let’s find out! Our undercover reporter tries to trick the Kaspersky team into saying they support cyberwar; but they hate cyberweapons so much
Last week, Kaspersky Lab’s student conference “Cybersecurity for the Next Generation” in Ecuador came to its conclusion. The program committee chose the three best papers from six presentations, with a
All industries, including IT, need emerging talent and ambitious specialists joining their ranks, bringing with them fresh ideas that help create a foundation for future innovations. Every year millions of
It may not seem like it when you look at the various threats facing consumers online right now, but experts say that we may have reached a point where we’ve seen
Up until recently it was completely fine to unlock your cell phone for use on a third-party carrier’s network. But that changed on Jan. 26 when a new law went
The password has become the black sheep of the security world, ostracized for its inability to actually protect users’ accounts and the laughable ease with which attackers can crack or
Heads up, you secretive Facebook users who have made yourself unsearchable on the world’s most popular social networking platform: You can hide no more. Facebook announced updated privacy features —
On Christmas Eve we counted the results of our light-hearted survey on Facebook. Users were asked to say which piece of malware, if any, they most associated with Santa. It