What is the difference between real and theoretical threats?
Today’s smartphones are full-fledged computers much more powerful than the desktops you used 10 years ago. Your device is very likely to contain data the cybercriminals are after,...
Today’s weekly news digest covers the stories about various mistakes in coding, and how they can be used for different purposes, including earning money.
Your legitimate copy of Angry Birds 2 may be infected with malware that steals your private data. How could this happen?
Cyber-literate users possesses a variety of good habits, which protect them online and offline. What are these traits?
A virus damaging hardware is one of the most widely believed myths in the infosec domain. And, at the same time, it’s the most non-standard one. And it’s not totally a myth, after...
The new trend on IFA 2015 is all about integrity and security. Meet Kaspersky Lab’s observations from the trade show.
Headlines raise alarm: the greatest hack in history finally reached iOS. Is that really so and who are the potential victims?
The rulebook for freethinking people: how not to get made the next time you log on Ashley Madison or buy goods in a sex shop online.
They teach a lot of things in schools, but they never tell you how to be safe in Internet. We have several simple advices on cybersecurity for you, that will help you stay away fr...