Want to defeat a cybercriminal? Stay calm, be smart, and check twice. Here is a list of security rules for every smart person who cares about cybersecurity.
Vitaly Kamluk answers our readers' questions about malware counteraction and various security issues.
In the past, technologies that see through walls were only available for some governmental services. Today, the situation has changed due to technological advancements that have c...
MRG Effitas awarded Kaspersky Lab its highest accolade for the development of reliable security technology for online banking.
Kaspersky Lab security expert Vitaly Kamluk answers our readers' questions about DDoS and botnets counteractions.
Vitaly Kamluk answers our readers’ questions about his work with INTERPOL and other digital investigations.
At the recent Google I/O conference, the ‘corporation of good’ announced four projects: Soli, Jacquard, Vault, and Abacus. Let's see what these curious techs are about.
I was repeatedly asked the question: “Once you decide to become a cyborg, how would your current routine change?” Today I’m going to give you 10 answers to this question.
The web service for secure password storage, LastPass, asks users to change their passwords ASAP.
Devices that have functions of special importance, or that contain top-secret information, are not usually connected to the Internet. However, going offline is not the ultimate pr...