Critical infrastructure: a role model to protect normal businesses?
After many years of working with clients trying to protect their industrial systems you learn one thing: critical infrastructure needs special attention.
663 articles
After many years of working with clients trying to protect their industrial systems you learn one thing: critical infrastructure needs special attention.
Facebook is going to use your WhatsApp data to tune its advertising, but for now you can opt out of this deal.
One Instagram post with a picture of a ticket can cost you a whole lot of time and money and ruin your day. This is how you can avoid it
Mobile banking is easy and convenient, but its adoption rate is still far from ideal.
The changeover from magnetic stripe cards to chip cards cost millions of dollars but promised greater security. At Black Hat 2016, researchers told us that the new cards are nonetheless insecure.
Novel protection methods often evolve from older ones. Therefore, we decided to write about a method of malware detection that is tried and true — and also cutting-edge.
Researchers discovered a hack that affects 100 million Volkswagen cars. And the equipment needed costs just $40.
Charlie Miller and Chris Valasek learned to hack a car’s steering wheel, brakes, and acceleration. They presented their finding at Black Hat USA 2016.
According to Kaspersky Security Network, the number of corporate users attacked by cryзtors has increased almost sixfold — from 27,000 in 2014–2015 to 158,600 in 2015–2016.
Short-term rental sites are great for travelers and homeowners. The Wi-fi? Maybe not so much.
In this roundup, we talk about five true leaks and some lessons to be learned from them.
Online dating fraud cost victims millions last year. Be vigilant and protect yourself!
When Canada-based adultery site Ashley Madison was hacked, cybercriminals wasted no time in taking advantage of it. Even now, a year later, they continue to blackmail people and hold their data hostage. We look back at what happened then and talk about what’s happening now.
How to protect yourself from ransomware? Are there any cross-platform cryptors? How much time does it take to catch a cybercriminal? Jornt van der Wiel discusses all of that and more
How to keep your money and data safe during the 2016 Olympics: All of the risks you need to know about, in one post.
Kaspersky Lab experts checked industrial control systems for vulnerabilities and found lots of them.
Ranscam deletes your files and then demands ransom to restore them, or it will delete them. Yes, in that order.
Smart MSPs craft security software proposals for SMBs and offer security systems management services that eliminate the need for in-house information security specialists. Not every service provider is good for small companies, but the most successful MSPs are focused on this segment.
You aren’t the only one to catch the PokémonGo craze. So have criminals.
Any USB device can potentially be zombified and turned into a secret agent for cybercrooks. The world needed a shield against this threat, so we rolled up our sleeves and created one.
Once, hackers wrote malware just for the fun of it, but now Trojans are serious business. However, here are five modern, weird malware samples that may be funny and strange, but they are still very dangerous.