How big data helps to catch criminals
Big data techniques are used to solve numerous problems: to cure rare diseases, catch poachers in India or find the best time to top trees in New York. Insurance agencies
612 articles
Big data techniques are used to solve numerous problems: to cure rare diseases, catch poachers in India or find the best time to top trees in New York. Insurance agencies
For children, modern phones and tablets often serve predominantly as universal game consoles. While there are hundreds of thousands of games to choose from, not all games are suitable for children: some
Many people still think that malware is a software that completely disrupts the normal functioning of PCs. If your computer is working well, it means it’s not infected, right?
In theory, it’s common knowledge that “there’s no such thing as a free lunch”, but when it comes to practice, some forget about the ‘free lunch’ proverb and prefer another
Kaspersky Lab experts make predictions about what trends will emerge in the security industry in 2015.
A new APT campaign called Regin targets the usual victims plus a prestigious cryptographer and the GSM standard on which most cellular communications occur.
By default, your iPhone’s OS is set to give you the best performance instead of the best battery life. But you can change that!
Beware of phishing, malware, spam and other online scams based on the extremely popular ALS Ice Bucket Challenge.
Community Health Systems breach exposes the Social Security numbers of 4.5 million patients. Were you a victim? If so, how do you react?
A recap of last week’s security news and research from the Black Hat hacker conference in Las Vegas, Nevada.
Any new technology can be rough around the edges. The consequences can be complex and there’s high chance for human error, especially when it comes to security.
It’s getting harder and harder to spot fraudulent online retailers as more and more websites peddling discounted good emerge in the already crowded field of Internet merchants.
Enabling two-factor authentication makes it significantly harder for an attacker to compromise your online accounts, but what is it and when should you use it?
eBay user passwords compromised in data breach; another Internet Explorer zero-day for Microsoft; Samsung eyes iris authentication; and patches from Chrome.
What Facebook habits make you vulnerable and how to avoid them.
It’s ridiculously simple to lose your money because of credit card fraud. Secure yourself in all stages―from choosing your card to paying overseas ―using our simple guide.
Headlines dominated by just two stories this week: a seriously widespread crypto bug known as Heartbleed and Microsoft’s end of security support for Windows XP
On October 25, 2001 Microsoft launched its newest operating system solution: Windows XP. In just three days, Microsoft sold over 300,000 boxed XPs: the new OS featured a number of
Despite recent scandals, RSA is still considered the biggest event in the security industry. It attracts the best brains, the best managers and the best influencers (although Security Analysts Summit is
With each passing year, the mobile malware landscape continues to evolve. It’s now driven by groups of criminals working to carry out large scale attacks and earn substantial profits. There
We talk about hackable consumer devices a lot here on the Kaspersky Daily. Generally though, the hacks are hypothetical, performed in controlled environments by computer scientists and professional hackers, some