The scary side of big data
Just think of the sticky fingers of banks, marketers and insurers that hunt for your personal data with revolting impudence and store them unsecured. So, what’s the fuss about?
1447 articles
Just think of the sticky fingers of banks, marketers and insurers that hunt for your personal data with revolting impudence and store them unsecured. So, what’s the fuss about?
Once more into a breach: 9.7 gigabytes of stolen data with users’ emails, credit card transactions and profiles leaked into the darknet.
Since there’s nothing unhackable in this world, why should chemical plants should be the exception?
In this post there are two seemingly unrelated pieces of news which nevertheless have one thing in common: not that somewhere someone is vulnerable, but that vulnerability sometimes arises from reluctance to take available security measures.
Don’t be a slowpoke, follow Dr. House’s rule: everybody lies, especially on the Internet.
The 2016 editions of the Kaspersky Lab product suite have enhanced privacy options for the company’s customers.
Three most important recent news with extensive commentary and trolling: nasty Android Stagefright vulnerability, new car hacks and Do Not Track 2.0 privacy initiative
Predictability of human beings can barely be overestimated when it comes to passwords. But what about lock screen patterns, are we predictable as well when we’re creating them?
Researchers compete at finding security holes in infotainment systems of connected cars and breaking in. The new case proves that Tesla does care a lot about security at wheel.
Security researcher Chris Rock discovered, that it’s very easy to kill a human. All you need is just a computer with Internet access, some knowledge and common sense.
Recently we wrote about the Jeep Cherokee hack incident. At Black Hat security researchers Charlie Miller and Chris Valasek finally explained, how exactly the now-famous Jeep hack happened.
History, tradition, passion and belonging to the world of motorsport. The 24 hours of SPA was all that and so much more
The number of vulnerable Google devices reached an all-time high since worst Android flaws ever are uncovered. There are already patches available but they may never reach end users.
Security experts often mention exploits as one of the most serious problems, although it’s not always clear why exploits are so special and scary. We’ll try to explain here.
Kaspersky Lab launches the new versions of its flagship products, designed with privacy concerns in mind.
A contactless bank card is a super-convenient thing. However, its ease of use would make you wonder whether stealing your money is equally easy.
What should you do if you use Kaspersky Lab products and you’re looking to upgrade your operating system to Windows 10?
Cybercriminals know how to benefit from your mobile devices. Be vigilant and follow our recommendations to secure your smartphones and tablets.
Ericsson and Qualcomm are promoting their new technology, LTE-U. Is it any better that LTE-A? And what is this combinations of letters supposed to mean, after all?
Taking over a Jeep Cherokee driving at speed 70 mph at a remote highway is quite real.
A bottle of good scotch in exchange for a day without a smartphone? Would I dare? That’s a piece of cake! That’s what I thought. As it turned out, it’s not that simple nowadays