Our personal implementation of the cloud security model is called Kaspersky Security Network. And here we'll explain how it actually works.
How many research centers do you need to fight for a safer cyber world? We used to have three labs based in Moscow, Beijing, and Seattle. Now, we’re excited to announce the openin...
It was recently discovered that certain Hospira drug infusion pumps contain dangerous and easily exploitable security vulnerabilities.
A legendary Soviet spy, Richard Sorge, is famous for conveying the exact date of the German invasion into the Soviet Union, and for letting the command know Japan had no plans of ...
Five lessons from the story of the Enigma cryptographic machine which are still relevant.
During WW2 modern cryptography principles were often coupled with ‘amateur’ ciphering methods. Curiously, the latter ones often proved to be equally reliable
New research demonstrates that it is possible to hack and hijack devices used to perform remote surgery
Yet another APT of the 'Dukes family' is hitting high-profile targets, including the US government office.
The story of how Israeli UAVs defend the country on the ground, in the sky, and in the information domain.
The annual RSA Conference in San Francisco, California of Internet-of-things insecurity and how no amount of money can fix computer security