The cheating website in an involuntary affair with hackers
Private data of 37 million users are at risk after a huge data breach on the popular Ashley Madison dating site.
1447 articles
Private data of 37 million users are at risk after a huge data breach on the popular Ashley Madison dating site.
In next 10-20 years UAVs, in one or another manner, will become an integral part of our life, but still remain highly prone to vulnerabilities and security issues.
The TeslaCrypt ransomware family is notable for targeting games-related files, as well as the usual documents. In the new version, it became even more dangerous.
Want to defeat a cybercriminal? Stay calm, be smart, and check twice. Here is a list of security rules for every smart person who cares about cybersecurity.
Vitaly Kamluk answers our readers’ questions about malware counteraction and various security issues.
In the past, technologies that see through walls were only available for some governmental services. Today, the situation has changed due to technological advancements that have contributed to price decreases.
MRG Effitas awarded Kaspersky Lab its highest accolade for the development of reliable security technology for online banking.
Which brain mechanisms are in charge of our memory? Kaspersky Lab analyzed why we forget information stored on our devices.
Kaspersky Lab security expert Vitaly Kamluk answers our readers’ questions about DDoS and botnets counteractions.
Vitaly Kamluk answers our readers’ questions about his work with INTERPOL and other digital investigations.
Facebook attracts a lot of cyber-criminals. Kaspersky Lab partnered with Facebook to protect you from these cyber-criminals.
At the recent Google I/O conference, the ‘corporation of good’ announced four projects: Soli, Jacquard, Vault, and Abacus. Let’s see what these curious techs are about.
I was repeatedly asked the question: “Once you decide to become a cyborg, how would your current routine change?” Today I’m going to give you 10 answers to this question.
The web service for secure password storage, LastPass, asks users to change their passwords ASAP.
Devices that have functions of special importance, or that contain top-secret information, are not usually connected to the Internet. However, going offline is not the ultimate protection.
Cybercriminals frequently use spam as the primary channel to spread malware. Of course, this is something we should take care of.
The first technology to enable instant long-distance communication was the telegraph. Back in its time, the telegraph helped to shape many of the current IT infrastructures.
What do a billionaire inventor Elon Musk, the Google Now on Tap service, and the recent “Ex Machina” movie have in common? They all are about artificial intelligence.
Kaspersky Lab has discovered an advanced attack on its own internal network and is sharing its investigation results. TL;DR – Customers are safe; neither products nor services have been compromised.
Just ten days after the remarkable Google I/O event, Apple is holding its own developers conference. Let’s take a look at the new security features.
We’ve collected the most interesting books and movies which give a lot of detail on how exactly ciphers are solved.