Hacking Humans
Go ahead and add insulin pumps and pacemakers to the ever-expanding list of computer-like-devices that contain bugs and are therefore vulnerable to exploit. That’s right, that little metal thing inside
3908 articles
Go ahead and add insulin pumps and pacemakers to the ever-expanding list of computer-like-devices that contain bugs and are therefore vulnerable to exploit. That’s right, that little metal thing inside
Using leased infrastructure for storing large amounts of data has been typical for several years. Leased capacities provide an advantage by allowing businesses to greatly reduce the cost of tending
A lot of families buy computers and devices as kids head back to school, making it the time of year for those comprehensive “101% Protection” anti-virus and Internet security suites
Kaspersky Internet Security has shown 100% efficiency in blocking Zero-day threats in independent test. Criminals constantly look for backdoors and vulnerabilities to discreetly infect your PC with malware while you
By this point you should be fairly well aware of the threats facing you when browsing the Internet on your digital devices. From phishing scams in your inbox to malicious
As we have mentioned, there are many ways to compare anti-virus software, but the most straightforward, we believe, occurs when researchers simulate real user behavior, and are confronted with online threats
In today’s age of technology, our various devices like laptops, smartphones and tablets are important places for storing sensitive data and are used on a daily or weekly basis. They
Kaspersky Lab’s Brian Donohue explains the latest on mobile hacks on Blackhat Download podcast for offline listening
Part two. The first part is available here. Risks associated with the vulnerabilities Bluebox reported that the vulnerabilities could be used to attain root rights in the system providing
It’s always good to have a real expert answering your questions. We’ve found the best of the best – members of Kaspersky’s Global Research and Analysis Team (GReAT), the research
The second half of July roused Android users as two very serious and unpleasant vulnerabilities were discovered. Researchers announced these so-called “master keys,” i.e. universal access to any Android device,
The rapid development of the smartphone and tablet market has gone hand-in-hand with an alarming growth in the number and variety of threats targeting these devices. We have a single
Everyday life and online shopping are inseparable. One plastic card allows us to fulfill practically every whim from a pizza to a car, allows us to pay bills and transfer
On the night of June 5, 2013 a coalition led by the FBI and Microsoft broke up a botnet of two million connected PCs that was being used by cybercriminals
Las Vegas – On the last day of July and the first day of August, a Roman empire-themed hotel and casino in the the Mojave Desert played host to what
Click on the image below to answer this week’s poll.
Did you miss a few of our articles in July? Catch up now with our monthly roundup of the latest Kaspersky news and tips! Send Gmails That Not Even Google
On July 31st at the Black Hat conference in Las Vegas, Security Research Lab’s (SRL) Karsten Nohl presented research on the SIM security flaw. Nohl experimentally demonstrated the vulnerability, which
It was predicted, it was feared, and the day has come. An Android Trojan that has the ability to steal money from bank accounts has emerged in Russia. We have
Today the news of the hacking of resources at a major IT company does not really come as a surprise to anyone. Unfortunately, attacks like this now happen more often
Kaspersky Lab expert Denis Maslennikov explains the vulnerabilities and possible threats of mobile banking apps.