
The unconventional list of top security events in 2015
Konstantin Goncharov recaps the most significant security events of 2015.
207 articles
Konstantin Goncharov recaps the most significant security events of 2015.
Passwords are a sensitive subject for the majority of Internet users. Let’s clarify, what are the right and wrong ways to use passwords?
Did you know that your PC can become infected by an email that you never actually read?
A renovated version of TeslaCrypt ransomware has recently affected numerous devices in Japan and Nordic countries.
Kaspersky Lab has recently conducted an unusual research and proved that many users hardly care about security. Here is the reason to create reliable passwords for all of your accounts.
Cellular networks are not that hard to hack and it is almost impossible to protect them. Telcos are not ready to take responsibility and spend millions of dollars to secure their clients.
Since you started to connect all those Things to the Internet, creating IoT, your home is no longer your fortress by design. Now attackers can spy on your kid through a baby monitor or break into your house by fooling your ‘smart’ security lock.
Criminals can use VoLTE to cause connection failure, subdue voice calls, or strip the victim’s mobile account of money.
Google’s Android OS is a vulnerable system. Developers make it worse by not providing critical patches in time.
A recent study of attitudes toward information risk shows that one in four (24%) IT specialists are concerned about the growing complexity of IT infrastructures and see this trend as a threat to security.
What is the difference between real and theoretical threats?
Today’s weekly news digest covers the stories about various mistakes in coding, and how they can be used for different purposes, including earning money.
Cyber-literate users possesses a variety of good habits, which protect them online and offline. What are these traits?
Our today’s weekly news digest covers three stories about the mistakes coders make when programming robots, the way other people exploit those design flaws, and then the reckoning.
Routers are again becoming a source of cyberthreats as a new batch of security vulnerabilities in UPnP were publicized earlier this month.
Kaspersky Security Center 10, the Kaspersky Lab’s unified management console, makes it easier to manage and secure all your endpoints – including physical, virtual and mobile devices.
Information security digest: the greatest iOS theft, farewell to RC4 cipher, multiple vulnerabilities in routers
Infosec digest: exploit kit Neutrino in Wordpress, yet another GitHub DDoS, Wyndham responsible for breach, while Target is not.
One can find a number of reasons why this very bug cannot be patched right now, or this quarter, or, like, ever. Yet, the problem has to be solved.
Three most important recent news with extensive commentary and trolling: nasty Android Stagefright vulnerability, new car hacks and Do Not Track 2.0 privacy initiative
Researchers compete at finding security holes in infotainment systems of connected cars and breaking in. The new case proves that Tesla does care a lot about security at wheel.