5 Million VTech accounts hacked – kids’ data exposed
VTech, a company that manufactures electronic learning devices, baby monitors, smart toys announced that information from 5 million customer accounts were accessed in an attack.
423 articles
VTech, a company that manufactures electronic learning devices, baby monitors, smart toys announced that information from 5 million customer accounts were accessed in an attack.
We talk a bit more about how our software protects businesses and helps their IT security staff.
Sometimes even cybercriminals go fishing. They hunt for a special goldfish — our personal data. So, what can you do to protect yourself from phishing?
Do you think that you have nothing to hack whatsoever? Bad news, guys: everyone has something hackable!
In Back to the Future 2, Marty McFly and co. come to 2015. Let’s see, which forecasts of this legendary saga are true and which are false.
What if you could be sure that your kids use Internet safely while their mobile phones are protected from fraud, unwanted calls and SMS? All you need for that is Kaspersky Safe Kids!
What is the Kaspersky Lab product is best for you? This post outlines the difference between KIS and KTS to help you choose which is better for you.
Today’s weekly news digest covers the stories about various mistakes in coding, and how they can be used for different purposes, including earning money.
A virus damaging hardware is one of the most widely believed myths in the infosec domain. And, at the same time, it’s the most non-standard one. And it’s not totally a myth, after all.
They teach a lot of things in schools, but they never tell you how to be safe in Internet. We have several simple advices on cybersecurity for you, that will help you stay away from trouble.
In-flight security made quite a lot of headlines this summer, but this time at unusual angle: the one quite surprising for an average passenger and quite expected for an IT specialist.
Ericsson and Qualcomm are promoting their new technology, LTE-U. Is it any better that LTE-A? And what is this combinations of letters supposed to mean, after all?
Andrey Pozhogin, cybersecurity expert at Kaspersky Lab, provides his expertise on the growing trend of ransomware attacks and what users and companies can do to protect themselves.
Devices that have functions of special importance, or that contain top-secret information, are not usually connected to the Internet. However, going offline is not the ultimate protection.
What do a billionaire inventor Elon Musk, the Google Now on Tap service, and the recent “Ex Machina” movie have in common? They all are about artificial intelligence.
Since the holiday season is upon us, we prepared a list of simple tips to help you minimize risks when renting a car abroad.
For many people security measures are a “secondary accessory,” and not something that should be cared for first and foremost. This is a common, but innately flawed mode of thinking.
While LTE networks are seemingly just now starting to take off, networking vendors and carriers are already fully engaged in a vivid discussion on 5G’s perspectives. What are those next-gen networks going to be and why do we need them at all?
It was recently discovered that certain Hospira drug infusion pumps contain dangerous and easily exploitable security vulnerabilities.
Personal smartphones and tablets are used to store working data, both personal and corporate passwords, and other sensitive information. So, it is troubling that mobile protection often lags behind.
The annual RSA Conference in San Francisco, California of Internet-of-things insecurity and how no amount of money can fix computer security