1194 articles
Yahoo is expected to announce a “massive” data breach soon. Although the news is not yet confirmed, you should be proactive and check the security of your Yahoo account.
When Google announced Allo, we thought the search giant was finally paying attention to users’ concerns about privacy. Reality turned to be quite different.
Security researchers claim that they have managed to remotely hack an unmodified Tesla Model S with the latest firmware installed.
How heuristic analysis and System Watcher work in Kaspersky Internet Security
Why questions like “What is your mother’s maiden name?” and “What did you do last summer?” don’t protect you.
We discovered a Pokémon Go Trojan in Google Play. It had already been downloaded 500,000 times.
Confused and wondering how Bitcoin and blockchain work? In this post we break it all down for you.
What do people consider more important, their smartphones or their relatives? The answer is in the video, and it may surprise you
Digital advertising brings money to companies and relevant ads to you and me — and attracts fraud. How does it all work?
The emergence of robocars could mean the end of personal vehicles as we know them. Here’s how things may go down.
Fantom ransomware displays a fake Windows Update screen while encrypting your files.
Some Android Trojans can write reviews and rate apps on behalf of users, but without their consent.
Hackers have stolen 68 million account credentials from Dropbox dating back to 2012. Here’s what you should do.
How Kaspersky Lab helped the Russian police catch the cybercriminals behind the Lurk banking Trojan and Angler exploit kit.
Facebook is going to use your WhatsApp data to tune its advertising, but for now you can opt out of this deal.
Powerful chatbots can replace real-life communication — and take over the world.
One Instagram post with a picture of a ticket can cost you a whole lot of time and money and ruin your day. This is how you can avoid it
Lynch law, loss of basic privacy, disgusting marketing, digital identity theft — how else can facial recognition be misused?
If you own an Apple device, spend a few minutes setting up your System Location Services. You’ll protect your privacy and lengthen battery life.
The changeover from magnetic stripe cards to chip cards cost millions of dollars but promised greater security. At Black Hat 2016, researchers told us that the new cards are nonetheless insecure.