Security Week 32: Android Stagefright, new car hacks, Do Not Track 2.0
Three most important recent news with extensive commentary and trolling: nasty Android Stagefright vulnerability, new car hacks and Do Not Track 2.0 privacy initiative
746 articles
Three most important recent news with extensive commentary and trolling: nasty Android Stagefright vulnerability, new car hacks and Do Not Track 2.0 privacy initiative
Windows 10 was launched to general availability on July 29th. The feedback so far is mixed, which isn’t unusual with new versions of Windows. Some say it’s the best Windows since XP, some call for caution. Security-wise and business-wise it looks promising.
Since Windows 10 arrived two days ago, new security-related concerns have surfaced. First and foremost, they’re about control over the data on Windows 10-based PCs and other devices.
Kaspersky Lab launches the new versions of its flagship products, designed with privacy concerns in mind.
It’s up to the manufacturers to change the approach to designing modern hi-tech equipment. As we have written before, security should come first. It must be taken in account at the design level, not added later.
Private data of 37 million users are at risk after a huge data breach on the popular Ashley Madison dating site.
Facebook attracts a lot of cyber-criminals. Kaspersky Lab partnered with Facebook to protect you from these cyber-criminals.
The primary issue here is the real cost of free offers. Hola’s stance is almost honest: You want free services? You have something that is of use to us – your idle or not-so-idle resources. If you don’t want them to be used by us, there is a paid tier for you.
Just ten days after the remarkable Google I/O event, Apple is holding its own developers conference. Let’s take a look at the new security features.
Kaspersky Lab researchers examined one city’s network of surveillance cameras and determined that the systems were not very secure.
Tech journalists Chris Brook and Brian Donohue discuss Google I/O, the IRS and Carefirst BlueCross BlueShield Data Breach in this Talk Security podcast.
At Google I/O 2015, the software giant presented a slew of new features and services. We take a first look at customizable app permissions, Android Pay, Now on Tap, and others.
For many people security measures are a “secondary accessory,” and not something that should be cared for first and foremost. This is a common, but innately flawed mode of thinking.
How many research centers do you need to fight for a safer cyber world? We used to have three labs based in Moscow, Beijing, and Seattle. Now, we’re excited to announce the opening of a fourth lab — our new European Research Center based in London.
Big data helps to catch child abusers, drug dealers, and terrorists, and allegedly it also helped to locate Bin Laden.
Threatpost security reporters Chris Brook and Brian Donohue discuss the Github DDoS, Dyre banking malware, privacy threats, hacking and more
The word “IoT” (Internet of Things) has been a buzz word for several years now. It has become the era when more home electronics and cars are connected to the
A New York artist made an exhibition out of making a single private and anonymous cell phone call outside the scope of government spying. Here’s how he did it:
Cyberbullying is one of the unpleasant effects of hyper-socialization that the Internet as a whole – and social networks in particular – bring us. Learn how to protect your children from it.
When it comes to Mobile OSes, every 3rd option conversation these days mentions the need for some “true openness”. But do we really need this kind of openness?
New allegations against the NSA claim the group hacked into the network of the world’s largest SIM card provider, stealing encryption keys to millions of devices.