Hacking an aircraft: is it already real?
In-flight security made quite a lot of headlines this summer, but this time at unusual angle: the one quite surprising for an average passenger and quite expected for an IT specialist.
664 articles
In-flight security made quite a lot of headlines this summer, but this time at unusual angle: the one quite surprising for an average passenger and quite expected for an IT specialist.
One can find a number of reasons why this very bug cannot be patched right now, or this quarter, or, like, ever. Yet, the problem has to be solved.
Once more into a breach: 9.7 gigabytes of stolen data with users’ emails, credit card transactions and profiles leaked into the darknet.
The experience of forgetting information you trust a digital device to remember for you is called Digital Amnesia. Digital Amnesia’s impact on businesses can range from mere inconvenience to something far more serious.
In this post there are two seemingly unrelated pieces of news which nevertheless have one thing in common: not that somewhere someone is vulnerable, but that vulnerability sometimes arises from reluctance to take available security measures.
Don’t be a slowpoke, follow Dr. House’s rule: everybody lies, especially on the Internet.
It’s not feasible to call a security solution, either for individual users or for businesses, “an antivirus.” There’s more than that.
The 2016 editions of the Kaspersky Lab product suite have enhanced privacy options for the company’s customers.
Three most important recent news with extensive commentary and trolling: nasty Android Stagefright vulnerability, new car hacks and Do Not Track 2.0 privacy initiative
Predictability of human beings can barely be overestimated when it comes to passwords. But what about lock screen patterns, are we predictable as well when we’re creating them?
Researchers compete at finding security holes in infotainment systems of connected cars and breaking in. The new case proves that Tesla does care a lot about security at wheel.
The number of vulnerable Google devices reached an all-time high since worst Android flaws ever are uncovered. There are already patches available but they may never reach end users.
Windows 10 was launched to general availability on July 29th. The feedback so far is mixed, which isn’t unusual with new versions of Windows. Some say it’s the best Windows since XP, some call for caution. Security-wise and business-wise it looks promising.
Security experts often mention exploits as one of the most serious problems, although it’s not always clear why exploits are so special and scary. We’ll try to explain here.
Kaspersky Lab launches the new versions of its flagship products, designed with privacy concerns in mind.
Cybercriminals know how to benefit from your mobile devices. Be vigilant and follow our recommendations to secure your smartphones and tablets.
Taking over a Jeep Cherokee driving at speed 70 mph at a remote highway is quite real.
Private data of 37 million users are at risk after a huge data breach on the popular Ashley Madison dating site.
Cybercriminals often pretend to be nice and amiable. Here are a few rules how not to become a victim of these malicious folks.
In next 10-20 years UAVs, in one or another manner, will become an integral part of our life, but still remain highly prone to vulnerabilities and security issues.
Want to defeat a cybercriminal? Stay calm, be smart, and check twice. Here is a list of security rules for every smart person who cares about cybersecurity.