Experiment: How easy is it to spy on a smartwatch wearer?
We investigate intercepting smartwatch motion-sensor data to monitor people and steal information.
81 articles
We investigate intercepting smartwatch motion-sensor data to monitor people and steal information.
What is the cost of an incident that affects corporate data? Which threats are the most expensive? Learn that and more from our latest research.
Find out if your smartphones, tablets, and laptops are coming between you and your loved ones.
Sex sells, as they say in advertising. In cyberspace porn serves as one of the most popular tools for malicious activity.
On this Kaspersky Lab podcast, Jeff talks with Sergey Golovanov about his SAS 2018 training on APT hunting.
The cybersecurity industry’s skills gap widens each year and is exacerbated by a distinct underrepresentation of women in the skills force
The CryptoShuffler Trojan does its utmost to go unnoticed, stealing Bitcoins on the sly.
Research shows that people who share data digitally are more likely to suffer from data loss and have device issues.
Although people seemingly have a deep affection for their data, they are yet to truly value their data and effectively protect their devices from these dangers.
Where are the most dangerous places to live? How about the biggest fans of e-mail — and of porn? All that and more in our annual cybersurvey.
As our research shows, the actual costs of a cybersecurity incident to a financial institution can add up to as much as $926,000.
Modern Android users have, on average, 66 apps installed on their devices. Most of these apps start working without users launching them.
People install way more applications than they use, rarely update them, and usually don’t adjust apps’ security/privacy settings properly.
Three-quarters of crypto-ransomware in 2016 came from the Russian-speaking criminal underground.
How often do victims succeed in getting back money stolen by online scammers?
Social media and ‘likes’ can hurt our relationships and everyday life. Here is how it happens.
At VB2016, Juan Andrés Guerrero-Saade and Brian Bartholomew of GReAT discussed why APT attribution is not easy.
A study reveals that people are tired of social networks, but keep using them because they can’t break the ties.
Ransomware research shows that paying ransom is no guarantee you’ll get your files back.
Forrester Research interviewed vendors and customers to evaluate top endpoint security providers.