Tips and methods of hacking global surveillance: makeup, special clothes, eyeglasses and more.
What is the difference between real and theoretical threats?
Today’s smartphones are full-fledged computers much more powerful than the desktops you used 10 years ago. Your device is very likely to contain data the cybercriminals are after,...
Today’s weekly news digest covers the stories about various mistakes in coding, and how they can be used for different purposes, including earning money.
Your legitimate copy of Angry Birds 2 may be infected with malware that steals your private data. How could this happen?
Cyber-literate users possesses a variety of good habits, which protect them online and offline. What are these traits?
Our today's weekly news digest covers three stories about the mistakes coders make when programming robots, the way other people exploit those design flaws, and then the reckoning
Facial recognition algorithms can track your movements with amazing accuracy. But if you know how they work you can trick them.
Kaspersky Lab joined hands with the Dutch police to arrest the criminals behind the CoinVault dangerous ransomware.
A virus damaging hardware is one of the most widely believed myths in the infosec domain. And, at the same time, it’s the most non-standard one. And it’s not totally a myth, after...