What changed in Sochi since Olympic games? Does infrastructure suit Grand Prix? Let's find out together.
We have bought our very own Blackphone to check its security firsthand.
Data breaches have become a routine. It can happen to any site, any day. You can’t prevent it, but there is a way to minimize the damage.
Your iPhone runs hidden monitoring services. Who uses them, and for what purpose?
A new version of file-encrypting malware hides its sever inside an anonymous TOR network, making it safer for criminals to extort money from victims.
Criminals invented Cryptolocker, spying malware and Zeus banking Trojan. We have new protection against them.
New analysis pinpoints some weaknesses in a new generation of cars with online capabilities. If exploited, this may result in car theft and other problems.
Let’s analyze new safety features in the upcoming Android release while we wait for it to arrive.
Kaspersky Lab’s recent research demonstrates that cyber-stealing is a very profitable and well-organized crime.
There were long time rumors about iPhone malware used to spy on smartphone owners, but now it’s official ―Kaspersky Lab researchers discovered a real life sample of this Trojan. ...