Hacking The Airport Security Scanner
If you try to think of the most secure place in the world, you probably think of some military bunker or U.S. President’s hiding vault. But for us ordinary folks,
3983 articles
If you try to think of the most secure place in the world, you probably think of some military bunker or U.S. President’s hiding vault. But for us ordinary folks,
This is a story of when security works, but it may also be the story of a new way to exploit the internet for dirty money: As you can easily
We all know that it is wiser to do things beforehand than to deal with the results of our carelessness. However, often we face situations when it is too late
Kaspersky Lab recently published a new survey called “Who’s spying on you” to describe the arising problem of cyber-espionage. In our previous article we pointed out that any company or
Late on a Friday afternoon in the middle of February Apple quietly issued a fix for a critical certificate validation bug in iOS that essentially could have given an attacker
Our CEO Eugene Kaspersky held his keynote on March 11, 2014 at the CeBIT Global Conference. He presented some examples to the audience, explaining the dangers of the world we
No doubt it has been a crazy week for anyone even remotely interested in Bitcoin. Mt. Gox, once the largest Bitcoin exchange marketplace out there, has shut down, putting a
Whenever one hears the words ‘cyber espionage’, large-scale campaigns affecting entire national states and transnational corporations such as Aurora, Flame or Duqu come to mind. Unfortunately, cyber espionage doesn’t necessarily
Our smartphones might have content we do not want others to see, even friends and relatives. Imagine the situation: you are planning a birthday surprise for your significant other and
As always, we continue to closely monitor the progress of law enforcement agencies as they chase down cybercriminals. Here are some cases from the last month. 3 years for DDoS-attack
The Olympics are over, but there’s one more top performer to consider for a gold medal: Kaspersky Lab, whose antivirus and computer security products performed more successfully than any other
The year started with Intel, AMD and their OEM partners announcing that they would soon release PCs that run both Android and Windows 8.1 at the same time. The pilot
In one of our previous tips we explained to you how to manually select actions on detected threats. When a suspicious file or activity is detected, Kaspersky Internet Security shows
Learn the ins and outs of TOR and what kind of sites this technology makes available in your system.
The growth of cyber threats targeting mobile devices has grown hand-in-hand with the increasing ubiquity of mobile devices in everyday lives. The range of threats grows just as rapidly as
This article is in reaction to the news that a new worm targeted specific models of Linksys routers. The Moon worm ([1], [2]) is exploiting a flaw of those routers’
Despite maybe a decade of dealing with these problems, SQL injection and brute force or credential theft attacks remain among the most potent methods used by attackers seeking to compromise
Major sporting events always attract the attention of cybercriminals, and there’s no reason to think the Brazil World Cup will be any different. With group stage matches kicking off in
Even though February is the shortest month of the year, we still have plenty of top stories to share with you, keeping you in the know when it comes to
Congrats on being named a Channel Chief two years in a row. How has the past year been for the channel program? Last year we were focused on partner enablement