Going green in IT: How and why
Four steps to reduce your company’s IT carbon footprint — and save money.
3758 articles
Four steps to reduce your company’s IT carbon footprint — and save money.
Under the pretext of compensation for data leaks, fraudsters are selling “temporary U.S. social security numbers.”
Researchers try to modify the contents of a signed PDF file without invalidating the signature.
The ransomware app now uses infected devices to send SMS messages abroad on the victim’s dime.
When training staff, it is not enough to give them the right information; they also have to digest it and remember it.
A Chaos Communication Congress speaker reflects on whether using open-source hardware can solve trust problems in hardware.
Longer product life cycles mean sustainability; shorter ones are easier in terms of support. Which should you choose?
Twitter has taken actions to prevent attacks with strobing images on people with epilepsy. Are these actions sufficient?
The Brothers Grimm fairy tales are deep source of object lessons in information security — not just for children, but also for adults.
Exploring front-running to capture the Gemini dollar’s antispam stake.
A report on attitudes to information security a long time ago in a galaxy far, far away, as exemplified in Star Wars: Episode IX.
How paranoid employers and jealous partners can spy on you, and why chip bags are best left to movie heroes.
Extorters are demanding ransom not in cryptocurrency, but in prepaid debit cards. All the same, you shouldn’t pay.
Cybercriminals are attacking small online stores, trying to trick their employees into opening malicious files.
Learn about Android device identifiers and how apps abuse them to make more money on ads.
Two schemes whereby a victim receives money — and neither one is good news.
We examine the workings of emotion-recognition technologies, their usefulness, and the privacy concerns they inspire.
The Kaspersky team has been named a 2019 Gartner Peer Insights Customers’ Choice for Endpoint Protection Platforms, for a third consecutive year.
One explanation of phishing success lies in a known psychological effect.
How to protect your Instagram account and personal photos from prying eyes.