Always keep your protection up-to-date!
Let’s take a moment to discuss why people tend to skip updating and upgrading their security solutions, and why this is detrimental.
3886 articles
Let’s take a moment to discuss why people tend to skip updating and upgrading their security solutions, and why this is detrimental.
Today’s information technologies are a rather mishmashed system comprised of top-notch innovations interspersed with legacy technologies, some of which have been in use for decades and rarely changed. This “coexistence” of new and old led to the discovery of dramatic bugs that had stayed below the radar for years.
A new APT campaign called Regin targets the usual victims plus a prestigious cryptographer and the GSM standard on which most cellular communications occur.
Kaspersky LAB and Hitachi Data Systems have partnered to ensure our products work together seamlessly and transparently.
Let’s take a moment to discuss the numerous troubles that our bright, technology-packed future could bring about.
Kaspersky Lab released its new IT Threat Evolution Q3 2014 report, dedicated to the most important security incidents and trends in the cybersecurity sphere. It may seem like attacks are increasing more rapidly than ever, but it’s detection rates that are growing.
Recent news concerning “hacked webcams” or “breached baby monitors” appears to be all over the place. Let’s take a closer look at the situation.
The Electronic Frontier Foundation recently graded a slew of mobile and Internet messaging services based on security and privacy. Here we list the low scorers.
Medieval doors were extremely sturdy due to their two-layer construction and different wood grain directions across those layers. Multilayered defensive structures is a must in cybersecurity as well.
By default, your iPhone’s OS is set to give you the best performance instead of the best battery life. But you can change that!
Microsoft has patched yet another bug in OLE, this time one that’s 19-years-old. While it is extremely surprising this bug hadn’t been discovered earlier, the crucial question here is the use of the underreviewed legacy code that developers have to drag along for decades.
The first five victims of Stuxnet were deliberately selected by the attackers and allowed to execute an attack on the uranium enrichment plant in Netenz.
Will mankind become overrun by technological and information threats while future humans’ raison d’etre would be to keep the machines going “Metropolis” or “Matrix” style? We don’t know. The future remains a product of our imagination until it comes true, while our reality is the consequence of actions.
This is how a seemingly simple SIM card in your smartphone can contribute to the loss of money and personal data.
The Electronic Frontier Foundation recently graded a slew of mobile and Internet messaging services based on security and privacy. Here we detail the top scorers.
The newly disclosed Darkhotel APT campaign will surely draw increased scrutiny to hospitality systems’ security worldwide. Hoteliers acknowledge the existence of security problems in their software systems, and many are opting to move these systems into the cloud. Is this a viable solution?
In this episode of the Talk Security podcast, Threatpost’s Chris Brook and Brian Donohue discuss the Dark Hotel cyberespionage campaign and the WireLurker Apple malware.
One morning when I was in a hurry to get to work, everything went wrong in an instant: an SMS message alerted me to an $80 charge to my credit card for a purchase that I never made.
Securelist has published extensive research on BlackEnergy. Initially a DDoS crimeware, it turned into a huge collection of various tools currently used in various APT-type activities, including some “significant geopolitical operations”.
Yesterday, researchers disclosed a powerful iOS vulnerability that is responsible for the WireLurker Apple malware.
1 in 8 people don’t believe that cyberthreats are real. The threat may go away if you turn your back to it in a dream, but that won’t work in reality.