
Ask the expert: Vitaly Kamluk tells how INTERPOL catches cyber criminals and other stories
Vitaly Kamluk answers our readers’ questions about his work with INTERPOL and other digital investigations.
640 articles
Vitaly Kamluk answers our readers’ questions about his work with INTERPOL and other digital investigations.
In Q1 of 2015, the amount of spam in the world’s email traffic is less than it was a few years ago, but still too high. Junk mail goes from annoying to dangerous when infected by cybercriminals.
What do a billionaire inventor Elon Musk, the Google Now on Tap service, and the recent “Ex Machina” movie have in common? They all are about artificial intelligence.
How did you like it the last time you saw your friends? Did you have a nice chat with them? Or were you all only taking pictures of your meals to post them on Instagram and talking to each other on Facebook?
Kaspersky Lab has just publicized the discovery of a new cyber-espionage campaign. Unlike previous thresats, it’s targeting smaller entities – namely SMBs. That’s where it gets interesting.
Since the holiday season is upon us, we prepared a list of simple tips to help you minimize risks when renting a car abroad.
I gather our readers have already heard about some controversial Google Glass experiences. Now, it is time to discuss the response by Microsoft, HoloLens augmented reality system.
Threatpost security reporters Chris Brook and Brian Donohue discuss the Github DDoS, Dyre banking malware, privacy threats, hacking and more
Losing a phone is always a bit of a nuisance, especially if it’s an expensive piece of hardware. With smartphones conquering the world with authority, losing a phone means also
WhatsApp has finally released a Web version of its popular mobile messaging service. We take a look at it from the security perspective.
The Internet continues to find its way into the private lives of its users. Here, we brief you on the most common methods of online tracking.
Banks continue to lose a lot of money because of carders and seek ways to ensure their customers are safe. Let’s take a look at the latest methods of bank card protection and how they may evolve.
Have you ever wondered how a typical office would look in a decade or so? Allow us to take you on a small tour of the most interesting office concepts.
CES 2015 was a superb event in terms of the amount of new technology per square foot. But, from an information security standpoint, it did not appear all that positive.
In this Talk Security podcast, Threatpost’s Chris Brook and Brian Donohue discuss the move to encrypt the Web, the Regin APT campaign and more.
Let’s take a moment to discuss the numerous troubles that our bright, technology-packed future could bring about.
Recent news concerning “hacked webcams” or “breached baby monitors” appears to be all over the place. Let’s take a closer look at the situation.
Car hacking is a topic that resurfaces regularly. Still, a remote takeover of a car’s system is not a reality – yet. It may become a reality without the proper approach to the security of a car’s on-board systems.
Using an in-room tablet in a hotel is an easy way to share your precious private data with the whole world and make it public.
New mobile and wearable devices offer users a robust set of innovative features and utilities but they often face the same traditional threats as old fashioned computers.
Your data is the finest treasure on your computer. Protect it the way the secret service protects a president, create a robust defense system where an antivirus will be just the last line of defense.