
Internet of Crappy Things, part 2: RSA conference edition
The annual RSA Conference in San Francisco, California of Internet-of-things insecurity and how no amount of money can fix computer security
210 articles
The annual RSA Conference in San Francisco, California of Internet-of-things insecurity and how no amount of money can fix computer security
Big data helps to catch child abusers, drug dealers, and terrorists, and allegedly it also helped to locate Bin Laden.
The word “IoT” (Internet of Things) has been a buzz word for several years now. It has become the era when more home electronics and cars are connected to the
The world of ubiquitous connected devices is almost here, and it’s so eagerly anticipated that it becoming a reality seems inevitable. Anticipation, however, doesn’t necessarily mean that we are going
The design of the current smartwatches is defined by being aimed at geeks. It looks like it will again take Apple to perform its duties carefully iSplaining wearables to ordinary people.
Let’s identify the main IT security and protection trends at MWC 2015.
The story of how a biochip was implanted into my hand and why I needed it.
Kaspersky Lab announced the immediate availability of Kaspersky Security System. The new platform is launched as an embeddable OEM component to manufacturers and vendors of comprehensive IT solutions.
There is a flood of appliances which could be connected – and some are connected – without a second thought as to whether or not it’s necessary or secure.
Today we discuss the most important news on information security from January.
Security reporters Brian Donohue and Chris Brook discuss security and privacy headlines from the first few weeks of the new year.
“British Prime Minister David Cameron to Ban Encrypted Messengers” — Headlines like this are appearing here and there. But what happened exactly?
Kaspersky Lab experts make predictions about what trends will emerge in the security industry in 2015.
Recent news concerning “hacked webcams” or “breached baby monitors” appears to be all over the place. Let’s take a closer look at the situation.
Will mankind become overrun by technological and information threats while future humans’ raison d’etre would be to keep the machines going “Metropolis” or “Matrix” style? We don’t know. The future remains a product of our imagination until it comes true, while our reality is the consequence of actions.
Last week was something of a slow week for those of us that spend our days writing about computer security news. However, while there may not have been an abundance
We talk about hackable consumer devices a lot here on the Kaspersky Daily. Generally though, the hacks are hypothetical, performed in controlled environments by computer scientists and professional hackers, some
Our security researchers have discovered yet another Advanced Persistent Threat (APT). “Icefog” targets government institutions, military contractors and industrial companies, mostly in Japan and South Korea. The Icefog backdoor uses
Passwords, the de facto authenticators, represent a serious security weakness for a number of reasons, chief among those is that humans quite simply tend to create bad passwords in order
When the U.S. Government comes poking around the world’s major Internet companies asking for customer data, Verizon, AT&T, Apple, and Yahoo are not particularly interested in protecting the general public,