Six myths about blockchain and Bitcoin: Debunking the effectiveness of the technology
Everyone talks about the advantages of Bitcoin and blockchain, but we never seem to hear about their disadvantages. Perhaps now is the time.
3885 articles
Everyone talks about the advantages of Bitcoin and blockchain, but we never seem to hear about their disadvantages. Perhaps now is the time.
Kaspersky Lab and Midori Kuma came to South Africa to educate children about the importance of online safety.
Android Trojans have been mimicking banking apps, messengers, and social apps for a while. Taxi-booking apps are next on the list.
The essence of the HuMachine concept is a fusion of big data, machine learning, and our analysts’ expertise. But what is behind these words?
Living online is more comfortable than ever — do you really still need a helmet?
Black Hat 2017 demonstrated that Microsoft enterprise solutions could be quite useful in attackers’ hands.
Can you be sure the encrypted USB drives you’re using won’t reveal your company’s secrets to hackers? Problem is, current certifications can’t guarantee it.
Microsoft changes its approach to cybersecurity solutions in response to partner feedback
What do movie characters typically do when there is a door with an electronic lock on their way? They call a hacker, of course. The hacker connects some sort of contraption to the lock. During the next several seconds, the device picks every possible combination and shows it on its (obligatory, bright) segment display. Voilà! The door is open.
Facebook’s Alex Stamos explains why the information security industry has the wrong priorities and what should be done about it.
A hacker connects a mysterious device to a lock, picks its code within a few seconds, and unlocks the door. That’s how it always happens in the movies, but is it the same in real life?
Many of us talk on Skype, Hangouts, WhatsApp, or Viber while using the computer for something else. You already know it’s not very polite, but it can be dangerous as well. Your conversation partner might find out what you are typing.
Modern smartphones are fast, powerful, and capable of practically anything. There is one catch, though: Give them a task and the battery charge evaporates.
We have some fantastic, earth-shattering-saving news: we’re announcing the global launch of Kaspersky Free!
A recap of the most important events in the cybersecurity industry and Kaspersky Lab’s history for the last 20 years.
Let’s have a quick look at some of the more curious and fun aspects of the company over the years — how it was in the ‘good old days’, how it looks now, and how it’ll be in the future.
Can I interest you in a nice, long, legally binding document? It’ll only take a few hours and maybe a law degree. No? You’re not alone.
What a troubleshooting report is and how to create one.
Even those who are responsible for arranging security awareness training may not solidly understand what cybersecurity training is, or even why the training is needed.