A small sex toy with big problems
Analysis of a German sex toy reveals all sorts of vulnerabilities.
685 articles
Analysis of a German sex toy reveals all sorts of vulnerabilities.
They say they have video of you watching porn, threaten to send it to your friends, and demand ransom in bitcoins? Don’t pay! We explain how this scam works.
How cybercriminals blocked Marcie’s iPhone, and how to avoid a similar fate.
The 5 most common ways spammers can trick you into paying them or giving up your personal information.
This research is intended to provide a snapshot of how people see cybersecurity and its context today.
We explain the types of malware that can take control of your device, and the dangers of multifunctional infection.
Given the great need for it on the part of our corporate customers – true to the market principles of supply and demand – we decided to come up with a new service for the market – Kaspersky Managed Protection.
Android lets you configure app permissions to protect your data and restrict access to dangerous functions. We explain how to do it and why.
Why you should try the brand-new free security service by Kaspersky Lab.
In the 40th edition of the Kaspersky Lab podcast, we look at Apple protecting privacy, Kim Dotcom, the World Cup, and more.
A traditional approach to cybersecurity is no longer good enough. Dealing with advanced threats requires advanced tools such as endpoint detection and response.
The European Commission’s proposed ePrivacy Regulation takes effect in May 2018. Why is it a battle — and who is fighting for what?
Internet of things is not getting any safer: Our experts analyzed a smart camera and found numerous vulnerabilities.
Want to protect your intimate photos from ever going public? Facebook has a suggestion: Upload them yourself!
Along with economic benefits, any new technology also comes with a certain number of problems. Cryptocurrencies are no exception.
How to Address Incident Response Challenges Introduction This year, Kaspersky Lab’s quarterly threat reports highlighted significant developments in the world of advanced attacks and epidemic outbreaks, with the infamous WannaCry
This week’s Transatlantic Cable podcast features stories on Burger King, scams, Instagram security and more.
Android Trojans have been mimicking banking apps, messengers, and social apps for a while. Taxi-booking apps are next on the list.
Introduction Sometimes personnel may take cybersecurity requirements too lightly, leading to dramatic consequences for the organizations they work for. In the recent WannaCry ransomware epidemic, the human factor played a
What is General Data Protection Regulation and what should you do about it