
Is your encrypted USB drive secure?
Can you be sure the encrypted USB drives you’re using won’t reveal your company’s secrets to hackers? Problem is, current certifications can’t guarantee it.
94 articles
Can you be sure the encrypted USB drives you’re using won’t reveal your company’s secrets to hackers? Problem is, current certifications can’t guarantee it.
Love the convenience and features of Dropbox but need better security? Here are some alternatives.
Drones are a part of the Internet of Things, which is widely known to be vulnerable. SEO title: How to hijack a drone
As we see from recent news, quantum computing is evolving faster than anyone could’ve expected. What does this mean for us, the average users?
For a messaging app to be truly private, encryption is not enough. In this post we discuss the necessary features of private messaging.
Cybercriminals are always on the lookout for a new trend to exploit and have developed malware that gives them access to encryption software.
Encrypted messaging comes to Facebook Messenger for Android and iOS
In the second part of our “Ask the expert” session, Jornt van der Wiel answers questions about encryption: how it works, what it is for, and more.
Hacked medical equipment can cost patients a lot — their health or even their lives.
At the recent I/O 2016 conference Google announced Android N, Wear 2.0, new messenger Allo, voice assistant Google Home, and a laundry list of other tech miracles. What about security?
Journalists and their whistle-blowers managed to keep the biggest data leak in secret. How did they do it?
Aleks Gostev of Kaspersky Lab’s GReAT discusses the WhatApp move towards encryption and how email needs to be next in adopting end-to-end encryption
WhatsApp has just adopted the end-to-end encryption based on Signal Protocol. Kaspersky Daily explains, why it’s the good news and what are the real benefits for all of us.
Categories: Featured, News, Security
We have previously discussed what VPN is. Now let’s review its implementations and their advantages and drawbacks.
Kaspersky Endpoint Security 10 can cipher not just one document, but entire archives and data storage media, both stationary and removable.
What exactly is a VPN? There has been a lot of buzz around it, but why do we need it?
SIM cards can be cloned. How is it possible and what does it have to do with cybercriminals?
Observing the evolution the good old SIM card went through and the results so far