Kaspersky IoT Scanner: How to keep your home network and its smart devices safe
The Internet of Things is vulnerable like nothing else. What should you do to secure your smart home and other devices on the home network?
4086 articles
The Internet of Things is vulnerable like nothing else. What should you do to secure your smart home and other devices on the home network?
The global launch of our free antivirus utility has prompted a bunch of questions and resurrected a couple of ancient myths.
A story about a large malicious campaign carried out in Facebook Messenger — and how it worked.
This week’s Transatlantic Cable podcast features stories on Burger King, scams, Instagram security and more.
How mobile Trojans exploit WAP billing to steal money, and how to protect yourself.
Considering the modern threat landscape, the healthcare industry should pay more attention to cybersecurity
Alex Moiseev addresses the issue of transformations that happen when a business starts working with enterprises.
Modern technology actually helps phone scammers — what you need to know to stay safe.
What should you do if your antivirus detects something it calls “not-a-virus”? What kind of applications are behind this message, and what is all the fuss about?
Considering the modern threat landscape, the healthcare industry should pay more attention to cybersecurity
Everyone talks about the advantages of Bitcoin and blockchain, but we never seem to hear about their disadvantages. Perhaps now is the time.
Kaspersky Lab and Midori Kuma came to South Africa to educate children about the importance of online safety.
Android Trojans have been mimicking banking apps, messengers, and social apps for a while. Taxi-booking apps are next on the list.
The essence of the HuMachine concept is a fusion of big data, machine learning, and our analysts’ expertise. But what is behind these words?
Living online is more comfortable than ever — do you really still need a helmet?
Black Hat 2017 demonstrated that Microsoft enterprise solutions could be quite useful in attackers’ hands.
Can you be sure the encrypted USB drives you’re using won’t reveal your company’s secrets to hackers? Problem is, current certifications can’t guarantee it.
Microsoft changes its approach to cybersecurity solutions in response to partner feedback
What do movie characters typically do when there is a door with an electronic lock on their way? They call a hacker, of course. The hacker connects some sort of contraption to the lock. During the next several seconds, the device picks every possible combination and shows it on its (obligatory, bright) segment display. Voilà! The door is open.
Facebook’s Alex Stamos explains why the information security industry has the wrong priorities and what should be done about it.