Real cybercrime fighting on the small screen
What happens when real cyber experts head to TV to stop cybercrime?
4008 articles
What happens when real cyber experts head to TV to stop cybercrime?
Check if your PC is infected with the help of our free security tools.
The vast majority of targeted attacks begin with simple steps; spear-phishing with malicious attachments or clickable links, or the infection of employees’ favorite websites (water-holing) to penetrate the security perimeter through the vulnerable browsers or other software. Don’t assume that because these methodologies are well-known, they are any less effective.
CTB-Locker comes back and strikes 70 web server from 10 countries across the globe. Who is at risk and what should they do?
Manufacturers need to change their mindset when it comes to the IoT
Kaspersky Lab announced WISeID Kaspersky Lab Security, a special edition of a mobile app jointly developed with WISeKey.
Apple SIM, Google Project Fi and, for example, GigSky are all virtual SIM cards. OK, what’s so virtual about them?
Two-factor authentication involving SMS, while used by most banks for quite some time, is not unbeatable.
Triada is a complex, stealthy, and professionally written malware suite. While it is mostly a consumer-level threat, Triada is also potentially dangerous to mobile apps-related businesses.
2015 proved: it’s possible to hack a connected car remotely. But is it as dangerous as it seems?
A massive flaw in transport layer security (TLS) protocol was discovered and it leaves millions vulnerable to an attack that could expose financial data and more.
Are you sure that one-time SMS passwords reliably protect your mobile bank? Think again! In this article we explain how Trojans fool two-factor authentication.
At the 2016 RSA conference, Kurt Baumgartner spoke on why we need to put some emphasis on security for the transportation industry.
We have previously discussed what VPN is. Now let’s review its implementations and their advantages and drawbacks.
The average American’s data has been stolen several times. Now when it’s done, what would a cybercriminal do next? We have discussed it at RSA Conference 2016.
According to figures released by Kaspersky Lab, about 16% of companies worldwide suffered a DDoS attack, rising to a quarter of enterprises.
While the popular notion is that Macs are virus-proof, it is actually quite a myth. These computers can catch viruses and Ransomware.
Find out how to make sure you’re keeping your Tumblr account as secure as possible.
Securelist issued a quick heads-up on what they called new ‘implants’ for OS X. It looks as though the notorious Hacking Team is back in business.
In this post we explain, what’s new in the latest update of the Private Browsing tool and how to use it.