All the world’s a context: Targeted ads go offline
Everyone is used to seeing targeted ads on the Internet. Now ads employing the same principles are emerging offline.
423 articles
Everyone is used to seeing targeted ads on the Internet. Now ads employing the same principles are emerging offline.
Our kids will be astronauts, artists, or travelers — whatever they want, because the boring tasks will be performed by robots.
Although people seemingly have a deep affection for their data, they are yet to truly value their data and effectively protect their devices from these dangers.
This year’s SAS: no shortage of the world’s top cybersecurity experts who’ll be telling all sorts of scary stories about who’s been hacked, where, and how, and what needs to be done in response.
We’ve got a multi-function cyber-X-ray in development, but some of its functionality can already be used right now.
People install way more applications than they use, rarely update them, and usually don’t adjust apps’ security/privacy settings properly.
The war with cyber-evil long ago turned into a war of algorithms. And effectiveness depends on the flexibility and reliability of the self-learning systems.
What will life look like in 20 years? In 30? In the Earth-2050 project, we make some predictions, and you can too!
Attentive listeners such as Apple Siri and Amazon Echo have settled down in our houses. What’s the harm?
Cameras in buildings, public areas, and even at home spy on us without our knowledge or consent. What can we do about it?
An unconventional Android Trojan does not do anything to your smartphone; instead it hacks the Wi-Fi hotspot the smartphone is connected to.
FAQ about ransomware: types, origins, dangers, and how you can stay safe
Photo files typically contain additional data on shooting conditions, including a geotag. What happens to this data when the photo is published online?
An unwitting army of connected devices caused an insane disruption of major Internet sites. IoT users need to wise up.
Our experts recently discovered an app called Guide for Pokémon Go distributed via Google Play. It looks like a single app created to help players of the much-hyped gaming title. But a little while after it’s installed, the app roots the device. Rooting makes the malware capable of installing and deleting additional apps.
The emergence of robocars could mean the end of personal vehicles as we know them. Here’s how things may go down.
Hackers have stolen 68 million account credentials from Dropbox dating back to 2012. Here’s what you should do.
Charlie Miller and Chris Valasek learned to hack a car’s steering wheel, brakes, and acceleration. They presented their finding at Black Hat USA 2016.
Did you know that some apps on your iPhone or iPad track your location, access your camera and calendar, and more? In Part 1 of this story, we show you how to turn off tracking using iOS’s privacy features.
Once, hackers wrote malware just for the fun of it, but now Trojans are serious business. However, here are five modern, weird malware samples that may be funny and strange, but they are still very dangerous.
While we rest, cybercriminals work. Kaspersky Lab discusses the main risks for tourists and travelers on business trips.