How easy is it for hackers to steal your face?
Fingerprints and iris scans are insecure and can be stolen to compromise your identity.
1182 articles
Fingerprints and iris scans are insecure and can be stolen to compromise your identity.
Do you think that you have nothing to hack whatsoever? Bad news, guys: everyone has something hackable!
Since mid-October, several major software vendors have released a number of security announcements and updates, most of them serious or outward critical.
With all of the hacks in the news, you may feel scared to shop online. Kaspersky Lab can ease your fears with the Safe Money feature of Kaspersky Internet Security 2016.
A new survey shows that businesses worldwide increasingly lose their faith in third-party suppliers. The reason? The increasing number of IT security incidents that they cause.
A botnet behind Dridex, a sophisticated banking malware stealing credentials of online bank accounts worldwide, are down.
Konstantin Goncharov explains the bottom line of tech giants’ epic fails in the new edition of cybersecurity news digest.
A recent study of attitudes toward information risk shows that one in four (24%) IT specialists are concerned about the growing complexity of IT infrastructures and see this trend as a threat to security.
What is the difference between real and theoretical threats?
Have you ever considered your smart office from an IT security viewpoint? Did it occur to you that by equipping your office with devices designed to provide life’s comforts, cybercriminals are handed even more opportunity to gain access to your corporate information and even to cause physical damage?
Today’s smartphones are full-fledged computers much more powerful than the desktops you used 10 years ago. Your device is very likely to contain data the cybercriminals are after, like banking data.
If the idea of “hacking-back” against cybercriminals who have harmed you or your company has seized you, your executive team, or your spouse as a reasonable thing to do, read
Cyber-literate users possesses a variety of good habits, which protect them online and offline. What are these traits?
Our today’s weekly news digest covers three stories about the mistakes coders make when programming robots, the way other people exploit those design flaws, and then the reckoning.
They teach a lot of things in schools, but they never tell you how to be safe in Internet. We have several simple advices on cybersecurity for you, that will help you stay away from trouble.
Infosec digest: exploit kit Neutrino in Wordpress, yet another GitHub DDoS, Wyndham responsible for breach, while Target is not.
Kaspersky Lab’s Q2 report on spam and phishing has arrived, and brought little surprises.
Kaspersky Lab has just released a new version of Kaspersky Endpoint Security for Mac, specifically for Mac-savvy businesses.
The BlueTermite APT campaign is rather new and extremely persistent. Here’s why.
These days, the propagation of zero-day exploits occurs almost literally at the speed of light. As soon as such useful exploit makes it to the public, APT authors can begin
Kaspersky Lab has just received a trove of new awards for one of its business products, Kaspersky Small Office Security.