What’s going to protect you from invisible enemies? A tin foil hat, of course!
Today is the first annual Tin Foil Hat Day. What is it?
583 articles
Today is the first annual Tin Foil Hat Day. What is it?
Protect your browser and keep your passwords, card credentials and personal data safe with the help of Kaspersky Protection.
Newborn Locky ransomware encrypted patients data in two hospitals in USA. Explaining this new dilemma and how to stop it.
Manufacturers need to change their mindset when it comes to the IoT
2015 proved: it’s possible to hack a connected car remotely. But is it as dangerous as it seems?
Are you sure that one-time SMS passwords reliably protect your mobile bank? Think again! In this article we explain how Trojans fool two-factor authentication.
At the 2016 RSA conference, Kurt Baumgartner spoke on why we need to put some emphasis on security for the transportation industry.
In a previous post, we discussed the definition of VPN (Virtual Private Network), its purpose and various use cases. Today we will review its most prevalent implementations, and their advantages
The average American’s data has been stolen several times. Now when it’s done, what would a cybercriminal do next? We have discussed it at RSA Conference 2016.
What if you could be sure that your kids are using the Internet safely and that their mobile phones are protected from fraud, unwanted calls and SMS? Kaspersky Safe Kids can help.
Find out how to make sure you’re keeping your Tumblr account as secure as possible.
A look at the evolution of mobile threats in 2015 and some predictions for 2016
While many mobile applications serve as a mere distraction, these apps can help simplify or streamline your daily life.
Over the weekend, Snapchat was compromised via a phishing email pretending to be from company CEO.
Shodan and Censys are the search engines for the Internet of Things and this duo is capable of wreaking havoc in a lot of different ways
The only way to ensure the security of online payments is to be at least one step ahead of the cybercriminals, and that can be achieved only by improving the technology.
Over the past week-plus, we have seen an escalation between Apple and the FBI in regards to unlocking the iPhone belonging to one of the shooters involved in the San
Why Steam users often fall victims to scams and frauds and how to avoid it.
Sooner or later each user of the Internet will face a trick or trap. Here’s the list of the most widespread ones. Forewarned is forearmed!
At SAS 2016 Sergey Lozhkin revealed how he hacked his friend’s hospital and medical equipment.