Gaming Console Hacks
For as long as I’ve been working in the security industry, which – in the spirit of full disclosure – hasn’t been a very long time, I have been shocked
4002 articles
For as long as I’ve been working in the security industry, which – in the spirit of full disclosure – hasn’t been a very long time, I have been shocked
The Christmas and New Year holidays, alas, were not a pretext for any real decrease in the number of information security incidents, as experts and users continue to face malware
Kaspersky Internet Security 2014 features the Quarantine component. We have received many questions about how this component works, so we are going to explain it in this tip. In
We talk about hackable consumer devices a lot here on the Kaspersky Daily. Generally though, the hacks are hypothetical, performed in controlled environments by computer scientists and professional hackers, some
We are starting a series of articles “Small business security stories” in which executives of formally small business companies talk about the role of IT and particularly data protection in
At the end of 2012, we thought were about to observe the End of the world. In 2013, the end of Futurama was gravely approaching. 2014 will bring us the
The name Dropbox has become synonymous with intrapersonal large file sharing, as has Google+ Drive (formerly Google Docs) and, to a lesser degree, Microsoft’s SkyDrive. But these options aren’t for
Bitcoin is a cryptocurrency that owes much of its popularity to its rather volatile — and occasionally very high — price. Its potential for investors has made it a tempting
I understand your initial interest in this article, but a disclaimer: porn is not the main topic of discussion in this post. Rather, I will focus on a position at
Reports emerged earlier this week that the Starbucks’ iOS mobile application could be exposing the personal information of any customers that downloaded it. To their immense credit – especially considering
Information security sites are brimming with discussions surroudning a new program, which is classified as 150% malicious since it causes great harm and spreads malice like all blockers do. It
You can locate your misplaced phone using any device connected to the Internet such as a tablet. Simple as A-B-C.
A number of widely used iOS banking applications from some of the world’s most prominent banks contain bugs that expose users to data theft and account takeovers. Specifically, a knowledgeable
Kaspersky Lab products have, once again, come out on top in independent testing of the leading security products. In quarterly testing conducted by security analyst Dennis Technology Labs from October
What browser do you use to surf the Internet? If you are a user of Microsoft Internet Explorer, then this tip is for you. The browser has a lot of
The Problem One of the most effective and dangerous ways to run malicious software on a victim’s computer is by exploiting vulnerabilities in popular applications or within the operating system.
Skype commercials make grandparents seem so happy, and why wouldn’t they be? Through the magic of the Internet, they can connect with their grandchildren and other loved ones instantly and
2014 will be an important year in the development of new cybersecurity threats. Threats related to commercial espionage and new forms of end-user targeting by criminals will likely be present.
Hello Kaspersky Lab blog readers! We’re always reminding you how important it is to buy licensed products. However, you should remember that not all software sold in stores or online
A few weeks ago Kaspersky Lab experts published a new study on the evolution of phishing over the past two years. Here is a summation of what the study found:
It may be the New Year, traditionally a time for new resolutions and goals, but we at Kaspersky Lab are continuing our dedication to standing by our promise to bring