SIM cards: attack of the clones
In the first part of our story we covered the history of SIM cards. Now let us get down to their security. One of the first vulnerabilities in SIM cards
3162 articles
In the first part of our story we covered the history of SIM cards. Now let us get down to their security. One of the first vulnerabilities in SIM cards
In today’s post, we’ll offer the answers to some questions that Kaspersky Academy fielded to Chief Marketing Officer at Kaspersky Lab, Alexander Erofeev. He will tell us about the role
One thing you might not know about hackers is that besides cracking some virtual systems many of them are fond of hacking real world stuff as well. One thing of
Being a parent is hard. Parents have too many things to worry about when it comes to their kids, ranging from childcare and schooling to eating healthy and screen time.
The number of smart devices is constantly increasing and each new product moves us closer to the epoch of the Internet of Things. Today it’s not a problem to buy
Usually we say “black box” when we speak about flight data recorders, but these devices are implemented on ships as well. They are called Voyage Data Recorders, or VDRs. Maritime
CES, or the Consumer Electronics Show, is held in Las Vegas in early January. This show typically defines the trends in home electronics, technologies and software for the upcoming year.
In a previous article, we explained the difference between Kaspersky Total Security and Kaspersky Internet Security. Now, let’s compare Kaspersky Internet Security and Kaspersky Anti-Virus. Kaspersky Anti-Virus offers basic security
So the whirlwind that is CES is in full swing. Companies of all sizes are introducing some pretty sweet products that will make our lives more connected and easier and
As part of our series looking at privacy, we will take a look at VKontakte (aka VK.com) a Russian social network to showcase how they look at privacy in comparison
At the recent Chaos Communication Congress in Hamburg two IT experts, Felix Domke and Daniel Lange (former Head of IT strategy at BMW) gave a talk on what exactly had
A SIM card, or Subscriber Identity Module is a familiar element of a mobile phone. It can be easily swapped or replaced, yet, it was not born at the same
Everyone loves the New Year. It is a chance for everyone to celebrate another year past with friends and loved ones, look towards a fresh start with a fresh calendar
Living in a digital age means that most of the things we use are operated and/or controlled by computers. This ranges from telecom appliances to cars, from factories and energy
No electronic device, however reliable it may be is 100% fail-safe. In order to make sure your files are not lost due to some kind of failure, we recommend you
There’s a lot to be said about passwords. First, every year new generations discover the Internet and keep making the same mistakes as their predecessors, who in turn do not
With the Christmas season coming to a close, it seemed as if we were ready to wrap up the keyboard and get on with the whole jolliness and mirth of
A strong password is essential for today’s online world. It should be at least eight characters and include capital and lower case letters along with numbers and special characters. They
We’ve told you this time and time again: never click suspicious links, never open files received from unknown sources, always delete mail from untrusted senders. While all of these pieces
iPower, a company behind a cloud storage service for government agencies, was surprised to discover a virus lurking in one of the body cameras used by policemen. People are getting
Malware development and our attempts to fight it sometimes remind us of a deep TV series: one can trace how “characters” acquire new skills, overcome hardships and make new achievements.