How Scary Can An Old-School Programmer Be?
Recently Eugene Kaspersky wrote in his blog a post about the so called Big Comeback of old-school virus writers. I am old enough to remember those guys and their brilliant
1447 articles
Recently Eugene Kaspersky wrote in his blog a post about the so called Big Comeback of old-school virus writers. I am old enough to remember those guys and their brilliant
While people remain really willing to share details of their lives via social media platforms such as Facebook, Twitter and Google Plus, the chief privacy officers at those companies say
The number of those affected by identity theft is on the rise again according to recent research. A quarter of consumers that received data breach letters last year wound up
The overwhelming majority of businesses today are encouraging employees to adopt “mobile” working practices, meaning that work can be done wherever, whenever and from whatever device – smartphone, tablet or
RSA is like the Hogwarts of Security, the annual reunion for cyber jedi masters or the secret fight club for private security companies, governmental agencies and international organizations. We’ve got
RSA is the major event in security. Basically it’s like the Big 8 International Conference or, better yet – the Olympics of security – except nobody is throwing spears and
The Mobile World Congress, which is currently under way in Barcelona, is the world’s premier telecoms industry event. It’s the place where the most important announcements are made on issues
Three young researchers have made their mark on the cybersecurity world and will now present their work at the final of the ‘CyberSecurity for the Next Generation’ student conference in
Social networks have become major targets for attackers, who value the implied trust that users have in their friends’ accounts. Compromising a large number of accounts on one of the
Young researchers, original security projects, making contacts among your peers, and a stepping-stone into the professional community – these are the key ingredients of Kaspersky Academy’s ‘CyberSecurity for the Next
Say you’re in a public space and you want to use your laptop to go online but there’s no WiFi available. Well, if you have your mobile device, you may
Meet Max, the IT Security Manager. See how Max, with the help of Kaspersky Lab, tackles the IT security battle in this new animation. Find out how IT security takes
Does Kaspersky write malware or create cyberweapons? Let’s find out! Our undercover reporter tries to trick the Kaspersky team into saying they support cyberwar; but they hate cyberweapons so much
Last week, Kaspersky Lab’s student conference “Cybersecurity for the Next Generation” in Ecuador came to its conclusion. The program committee chose the three best papers from six presentations, with a
All industries, including IT, need emerging talent and ambitious specialists joining their ranks, bringing with them fresh ideas that help create a foundation for future innovations. Every year millions of
It may not seem like it when you look at the various threats facing consumers online right now, but experts say that we may have reached a point where we’ve seen
Up until recently it was completely fine to unlock your cell phone for use on a third-party carrier’s network. But that changed on Jan. 26 when a new law went
Every couple of months, seemingly, the world gets up in arms about the latest changes to Facebook’s privacy policy. But Facebook isn’t the only social media site that collects and
The password has become the black sheep of the security world, ostracized for its inability to actually protect users’ accounts and the laughable ease with which attackers can crack or
From its then-revolutionary touchscreen interface to the somewhat ill-fated Siri voice control, Apple’s iPhone has always set the standard for mobile devices since its first version hit the stores in