How my face got stolen
One day I found out that someone was passing off my photos as their own. Here’s what I did.
685 articles
One day I found out that someone was passing off my photos as their own. Here’s what I did.
Our experts have identified at least eight independent threat actors competing for the right to extort money from businesses.
Cameras in buildings, public areas, and even at home spy on us without our knowledge or consent. What can we do about it?
If you already have a Kaspersky security solution, you can extend the license at a discount!
We at Kaspersky Lab consider the Adaptive Security Architecture the most efficient model to build up cybersecurity practices for industrial objects
Ransomware infects 2,000 SFMTA computers, makes Muni rides free for the weekend.
More than 70% of active Internet users have considered quitting their social networks. What do they have to lose?
Ransoc ransomware gathers data from victim’s social networks and hard drives, and uses it to blackmail victims.
We continue our series on the mechanics of Internet advertising. This time we will focus on the the various types of ads and how, precisely, they work.
What are older people doing online, and are they aware of the threats out there?
The emergence of robocars could mean the end of personal vehicles as we know them. Here’s how things may go down.
What lessons can businesses learn from the story of our investigation of the activity of the Lurk gang?
The most common definition of security intelligence is knowing how your business may be attacked. This is an important part of security expertise, but it’s not the only one.
We use the right approach for every group, showing every employee how they contribute — and how to contribute — to the security of the organization.
In this roundup, we talk about five true leaks and some lessons to be learned from them.
How to keep your money and data safe during the 2016 Olympics: All of the risks you need to know about, in one post.
You aren’t the only one to catch the PokémonGo craze. So have criminals.
An Indian-speaking threat actor, Dropping Elephant chooses targets mainly in the Asian region, paying particular attention to Chinese government/diplomatic organizations – and also to foreign embassies and diplomatic offices in China.
A new APT group is seen to have been exploiting hotpatching, a now-deprecated feature in Windows operating systems, to carry out their attacks.
Do you know how many companies are actually tracking you when you visit a single website? The answer may surprise you.
Locky and Petya ransomware strains took the world by storm when they shouldn’t be successful at all.