Cardiac Exsanguination: a Heartbleed damage round-up
Two months have passed since the Heartbleed disclosure. Now it is time for a round-up: What damage did it inflict and what can we expect?
39 articles
Two months have passed since the Heartbleed disclosure. Now it is time for a round-up: What damage did it inflict and what can we expect?
The Internet has made planning and booking a vacation easier than ever before. But beware, there are lots of scammers who are ready to pounce on unsuspecting victims booking their vacations this time of year.
Despite maybe a decade of dealing with these problems, SQL injection and brute force or credential theft attacks remain among the most potent methods used by attackers seeking to compromise
During the 20th century, many detective stories began with a protagonist noticing that some suspicious persons were following him. According to a recent (and a very non-fictional) publication in The
It was a very typical situation of “yesterday it worked!” In the morning, the accountant’s laptop would not turn on. More precisely, it did turn on but the operating system
Recent revelations about government surveillance have once more brought two-decade old PGP software into the spotlight, as it remains a quite robust and secure mechanism for communications. However, progress in
If you have been following the latest in news, you’ve probably heard a lot of stories talking about privacy, information leakage, espionage and such. Given that most of our communications
The world has been up in arms about the expansive and invasive reach of the U.S. government’s National Security Agency (NSA) ever since the world was introduced to Edward Snowden
Even if you follow all the Cardinal Rules of system security — you regularly update your operating system and programs, avoid spam like the plague and never click through on suspicious
The popular microblogging website, Tumblr, announced a breach in its security for iOS customers last week. The company asked all users of its iPhone and iPad app to change their
Security professionals and enthusiasts are aware of rootkits, but general audiences typically don’t know about this kind of malware, which is specifically designed to hide itself and its activity in
The Internet has revolutionized the way we book our holidays. Unfortunately it is also enabling fraudsters to prey upon people’s desires to have a perfect vacation, so stay vigilant and
Another day, another online service adds two-factor authentication to its list of features. This time it was Evernote, the cloud-based note-taking service that hackers managed to compromise and use as
Computers, initially created for military cipher breaking, give everyone an almost perfect way to keep our secrets totally private – through encryption. For a long time strong encryption was only
Given the deftness of malicious hackers, the bar-lowering impact of easily accessible markets for automated cybercriminal kits, and the increasing number of online services and people connected to the Internet,
Virtual Private Networks, or VPNs for short, have become increasingly essential of late as we more often access sensitive data from remote locations — and as the threat of having our
People rely on the Internet today for so much more than they did even five years ago. Whether it’s social media, mobile applications, online banking, shopping, or just renewing your
Kaspersky Internet Security’s secure keyboard activates automatically when using bank or payment websites and every time you enter a password on any website. Keep your passwords and financial data safe.