World War II information security: Navajo VPN
During WW2 modern cryptography principles were often coupled with ‘amateur’ ciphering methods. Curiously, the latter ones often proved to be equally reliable
254 articles
During WW2 modern cryptography principles were often coupled with ‘amateur’ ciphering methods. Curiously, the latter ones often proved to be equally reliable
We’ve created an infographic that shows how the Kaspersky Lab flagship antivirus software has improved over the last 10 years.
Yet another APT of the ‘Dukes family’ is hitting high-profile targets, including the US government office.
Recent report by US GAO was treated by medias as “Modern aircrafts can be hacked and commandeered through onboard Wi-Fi”. Is it really that bad?
While surfing the Internet, children may come across web pages containing inappropriate information. IT solutions can help protect children from such content.
With so many games and apps available for download on your mobile devices, it’s important to remember that not all of them are suitable for children. That’s why you should be monitoring what your kid installs.
Children who use mobile devices can be more vulnerable to cyber threats because they are free to surf the Internet at any time or place, without adult supervision.
Cyberbullying is one of the unpleasant effects of hyper-socialization that the Internet as a whole – and social networks in particular – bring us. Learn how to protect your children from it.
Scientifically proven: video games may really boost your intellectual abilities.
Let’s talk about the dangers of cross-border payments with plastic cards and security flaws in payment systems architecture.
The Internet continues to find its way into the private lives of its users. Here, we brief you on the most common methods of online tracking.
Whether you’re buying or selling a secondhand Apple device, you can be fooled by criminals. We have gathered tips on how to minimize your chances of being taken by such frauds.
Information on how to enter and prize details form part of these terms and conditions. By entering this promotion you are deemed to have accepted these terms and conditions. This
Merry Christmas from everyone at Kaspersky Lab! We hope you enjoy some time with family and friends this holiday season.
Applying the incorrect settings to your router may lead to serious problems. Here is a short guide to protecting your home Wi-Fi network.
Let’s take a moment to discuss why people tend to skip updating and upgrading their security solutions, and why this is detrimental.
The first five victims of Stuxnet were deliberately selected by the attackers and allowed to execute an attack on the uranium enrichment plant in Netenz.
Let’s take a look at the security features in the new version of Mac OS X – Yosemite. Apple certainly makes a decent effort.
Using an in-room tablet in a hotel is an easy way to share your precious private data with the whole world and make it public.