Astrologers proclaim 2018 the year of transparency. Our bug bounty just increased — twentyfold
We’re launching the Global Transparency Initiative. What is it? Eugene Kaspersky explains.
1447 articles
We’re launching the Global Transparency Initiative. What is it? Eugene Kaspersky explains.
Eugene Kaspersky responds in detail to recent allegations about his company and the Russian government.
One of the most popular porn sites in the world was serving malware through ads to millions of its users.
The real scale of the Yahoo breach (spoiler: 3 billion), Facebook’s own Face ID, UK Lottery DDoS, and more.
A new blocker called nRansom locks users out of their computers and demands not money, but nude pictures.
In this week’s edition of the Transatlantic Podcast we discuss the Equifax breach, HMRC bug problems, hacking a fish tank and more. As always, we deliver the news in 20 minutes or less.
Android users have the largest selection of mobile apps, but that means they are also exposed to the most threats. Avoid mobile malware by following some basic security rules.
Fraudsters make a fortune mining cryptocurrencies — on your computer, at your expense, and without your knowledge.
Transatlantic Cable Podcast episode 2: autonomous pizza delivery, Sarahah’s privacy issues, reprieve for victims of Yahoo!’s data breach and more.
Equifax had a data breach impacting 143 million Americans. What’s next?
Modern technology actually helps phone scammers — what you need to know to stay safe.
What should you do if your antivirus detects something it calls “not-a-virus”? What kind of applications are behind this message, and what is all the fuss about?
Android Trojans have been mimicking banking apps, messengers, and social apps for a while. Taxi-booking apps are next on the list.
Microsoft changes its approach to cybersecurity solutions in response to partner feedback
Facebook’s Alex Stamos explains why the information security industry has the wrong priorities and what should be done about it.
A hacker connects a mysterious device to a lock, picks its code within a few seconds, and unlocks the door. That’s how it always happens in the movies, but is it the same in real life?
At the Black Hat conference, researchers demonstrated that typing on the keyboard while talking on Skype is not safe.
Assembly robots are made with physical safety in mind, but hacking these machines is still frighteningly easy
Just when you think you have seen everything hacked, Black Hat comes along and shows you that a car wash can be hacked.
No More Ransom turns 1. We recap what the joint initiative has achieved so far.