 
			
		Drones and security: where are we heading?
In next 10-20 years UAVs, in one or another manner, will become an integral part of our life, but still remain highly prone to vulnerabilities and security issues.
4063 articles
 
			
		In next 10-20 years UAVs, in one or another manner, will become an integral part of our life, but still remain highly prone to vulnerabilities and security issues.
 
			
		With all of the security improvements, criminals find and exploit various ways of circumventing them to deliver their malicious creations to end-users’ phones, which puts at risk both the device owners and the businesses they are involved with.
 
			
		Andrey Pozhogin, cybersecurity expert at Kaspersky Lab, provides his expertise on the growing trend of ransomware attacks and what users and companies can do to protect themselves.
 
			
		More than a half of mobile devices users carry out financial transactions on them, and roughly the same amount stumbled upon a financial threat recently. Yet, in most cases, there are no security solutions and/or passwords in place.
 
			
		The TeslaCrypt ransomware family is notable for targeting games-related files, as well as the usual documents. In the new version, it became even more dangerous.
 
			
		You tell them: Hey guys, you have snakes in your backyard. And they tell you: No, no, that’s impossible. They stick to their belief until the moment when a stick under their own leg turns into a venomous monster.
 
			
		Want to defeat a cybercriminal? Stay calm, be smart, and check twice. Here is a list of security rules for every smart person who cares about cybersecurity.
 
			
		They say history repeats itself and that holds true with revolutionary development. The malware industry has advanced so much that antique ideas are relevant again.
 
			
		Throwing away the old junk makes the environment healthier in every possible sense.
 
			
		Vitaly Kamluk answers our readers’ questions about malware counteraction and various security issues.
 
			
		Attacking a broad spread of companies allows the group to access potentially valuable ‘bonus’ data from unexpected sources.
 
			
		Hackers and cyberspies are not something you only see at the movies. The Internet is actually crawling with weirdos and criminals who are just looking for a chance to infect your smartphone or steal your gaming account.
 
			
		In the past, technologies that see through walls were only available for some governmental services. Today, the situation has changed due to technological advancements that have contributed to price decreases.
 
			
		Earlier this year, Kaspersky Lab’s products received commendations from a number of respected independent testing labs. Here are a few pertaining to our business-oriented products.
 
			
		A huge state-of-art building on 18 Napier Road in Singapore is nestled among the green created by local flora and tropical climate, almost like a spaceship. As written on the
 
			
		Kaspersky Lab recently released the list of its newly received patents on both sides of the Pacific. We take a look at a few of them.
 
			
		Kaspersky Lab’s regular reports on threat dynamics and trends are called “IT Threat Evolution” not just for catchy word’s sake. IT threats are improving well in accordance with the laws of evolution – i.e. “natural selection”.
 
			
		MRG Effitas awarded Kaspersky Lab its highest accolade for the development of reliable security technology for online banking.
 
			
		Which brain mechanisms are in charge of our memory? Kaspersky Lab analyzed why we forget information stored on our devices.
 
			
		Quite a few new APT campaigns were discovered in the last year and a half. Here is a glimpse of a potential landslide in the making with two of them.
 
			
		Kaspersky Lab security expert Vitaly Kamluk answers our readers’ questions about DDoS and botnets counteractions.