Machine learning: 9 challenges
What surprises do machine learning have in store for us? How difficult is it to trick a machine? And will we end up with Skynet and rise of the machines? Let’s take a look.
3885 articles
What surprises do machine learning have in store for us? How difficult is it to trick a machine? And will we end up with Skynet and rise of the machines? Let’s take a look.
Are the IoT’s security issues placing the industry on the road to a litigation nightmare?
Our Security Services folks published a report on the errors they see most — here they give advice on how to make your infrastructure more cyberresilient.
Almost half of the most-visited websites open visitors to potential dangers. What can you do?
When it comes to online accounts, voicemail is a major security hole. Here’s why.
Why you should try the brand-new free security service by Kaspersky Lab.
It makes sense to assess risks and carefully craft a protection strategy before adopting mobile device usage at work.
The 50th edition of the Kaspersky Lab podcast looks into the latest in Google tracking, spam, and hacking ATMs and police body cameras.
KeyPass ransomware is infecting computers worldwide, encrypting almost everything in its path. And it all starts with downloading a seemingly innocuous installer.
How security researchers were able to track down cryptocurrency bots on Twitter.
Any piece of malware can be captured if you know it for what it is — for example, if you use a trainable behavioral model.
Take a stroll through your apps and you’re bound to encounter some unfamiliar names. Where do those unaccounted-for apps on your PC come from, and are they safe?
How a sculpture from Japan is scaring WhatsApp users around the world, and how to protect children from such spooks on the Internet.
In this edition of the podcast, Jeff and Dave discuss the Black Hat USA conference, a downside of Fortnite coming to Android, the Reddit hack, and our latest report on the state of malware.
The difference between the paid and free versions of Kaspersky Internet Security for Android.
In this part, we consider mobile malware capable of causing real damage to smartphone and tablet users.
In this edition of the podcast, Jeff and Dave discuss a McDonald’s Monopoly whopper, banning miners, hacking by inmates, and more.
58% of small and medium-size companies use various public-cloud-based business applications to work with customer data.
More than 400 manufacturing companies became phishing targets.
When I fell victim to sleight of hand and a little bit of fraud, Find My iPhone didn’t save me. Here’s why.