What will the office of the future look like?
Have you ever wondered how a typical office would look in a decade or so? Allow us to take you on a small tour of the most interesting office concepts.
404 articles
Have you ever wondered how a typical office would look in a decade or so? Allow us to take you on a small tour of the most interesting office concepts.
Kaspersky Lab has just released its forecast of digital realities for 2045. Big changes are anticipated for the entire IT world and businesses. Security challenges will change as well.
CES 2015 was a superb event in terms of the amount of new technology per square foot. But, from an information security standpoint, it did not appear all that positive.
A recap of last week’s security news and research from the Black Hat hacker conference in Las Vegas, Nevada.
New analysis pinpoints some weaknesses in a new generation of cars with online capabilities. If exploited, this may result in car theft and other problems.
This article is in reaction to the news that a new worm targeted specific models of Linksys routers. The Moon worm ([1], [2]) is exploiting a flaw of those routers’
The Internet of Things is the latest term used to define all kinds of consumer electronics connected to the Internet – from refrigerators and washing machines to irons. Just like
Stefan Tanase, Kaspersky Lab’s Senior Security Researcher, Global Research & Analysis Team, answers users’ questions about social networks, malware and everything in between. There is a saying: “information is power”
Computers have advanced in the last 20 years from building-sized mainframes to smartphones that can fit in your pocket (and have become infinitely more capable, to boot), yet we use
Advertising firms’ extensive collection of personal data is becoming of great use to intelligence agencies. So how to guard against mass surveillance?
Proxyware can make it difficult to detect cyberattacks on organizations — sometimes making the latter unwitting accomplices in crimes.
Commercial spyware — what it is, how it infiltrates devices, what it can do once inside, and how to defend against it.
What’s the easiest way to hack a WPA2-protected wireless network? Using PMKID interception. Here’s how it works, and what you can do to protect yourself.
One-time codes and two-factor authentication securely protect you from account theft. If you receive such a code or a request to enter it when you aren’t logging in, it may be an attempt to hack into your account.
Today we’re talking about crypto drainers — one of the most serious threats to crypto owners — and offer tips on fending it off.
Let’s start the New Year with a digital cleanup: canceling unnecessary subscriptions, clearing out unnecessary data, deleting unused accounts, changing weak passwords, and so on.
Can’t get to the stores in time to buy gifts for friends and family? Go digital!
The new global survey explores consumers views and shopping behavior when it comes to big sales events such as Black Friday or Cyber Monday.
A look at the pros and cons of updating Android — and ways to do it safely.
A look at some recent cases of Android malware infiltrating the most official of official app stores — Google Play.