Encryption the rage, email missing in conversation
Aleks Gostev of Kaspersky Lab’s GReAT discusses the WhatApp move towards encryption and how email needs to be next in adopting end-to-end encryption
1447 articles
Aleks Gostev of Kaspersky Lab’s GReAT discusses the WhatApp move towards encryption and how email needs to be next in adopting end-to-end encryption
USA and Canada governments are fed up with the tyranny of ransomware. Experts from both countries analyzed the latest incidents and released an advisory for their citizens.
WhatsApp has just adopted the end-to-end encryption based on Signal Protocol. Kaspersky Daily explains, why it’s the good news and what are the real benefits for all of us.
Categories: Featured, News, Security
These incidents sound like a detective story, but are taken from real life. It’s almost impossible to avoid targeted hacking and here we explain why is that so.
Today is the first annual Tin Foil Hat Day. What is it?
A pirate app store that has tricked Apple and passed its code review is now stealing user’s credentials using FairPlay Man-in-the Middle attack.
We’ve all heard of expert multi-taskers. But are they really good at what they say they are?
Cryptolocker was bad, CTB-Locker was even worse, and new Petya ransomware is a freaking disaster.
It’s not the best idea to use Safari on your phone with no ad blocker at all. You can remedy this omission with the help of our new iOS app Kaspersky AdCleaner!
Big data is amazing for sure, but as any other tech, especially emerging one, it has issues. Let’s take a look what could possibly go wrong with big data implementations.
As new technologies become increasingly pervasive, we are starting to reconsider our vision of many things. Kaspersky Lab CMO Alexander Erofeev contemplates the ways the Internet transforms our views on privacy.
Newborn Locky ransomware encrypted patients data in two hospitals in USA. Explaining this new dilemma and how to stop it.
What happens when real cyber experts head to TV to stop cybercrime?
Check if your PC is infected with the help of our free security tools.
CTB-Locker comes back and strikes 70 web server from 10 countries across the globe. Who is at risk and what should they do?
Manufacturers need to change their mindset when it comes to the IoT
Apple SIM, Google Project Fi and, for example, GigSky are all virtual SIM cards. OK, what’s so virtual about them?
2015 proved: it’s possible to hack a connected car remotely. But is it as dangerous as it seems?