Hacking air conditioners leads to the whole block’s blackout
At the Security Analyst Summit 2016 Vasilios Hioureas from Kaspersky Lab and Thomas Kinsey from Exigent Systems revealed how anybody with $50 in their pocket can hack one of their
987 articles
At the Security Analyst Summit 2016 Vasilios Hioureas from Kaspersky Lab and Thomas Kinsey from Exigent Systems revealed how anybody with $50 in their pocket can hack one of their
Every year Kaspersky Lab products take part in a number of short- and long-time tests that are held by independent laboratories. It’s no secret that our solutions continually show high
Automated teller machines (ATM) have always a been a big target for criminals. In the past hunting for ATMs included some heavy tools like a cutting torch or explosives. However
Much like the general population, cybercriminals have areas of expertise. Some grift people on social networks, other spread malware via emails and then there are the ones who know how
You can literally find anything on the Internet; unfortunately this includes bad guys. There are thousands of ways to deceive an Internet user ranging from legal to illegal – some
The SAS has come and gone. A lot of great knowledge was dropped during the conference including insights on Poseidon, Adwind and Metel. As we come back to reality, we
It is inevitable that sometime in our lives either illness or injury will send us to the hospital to be cared for by a doctor or team of doctors. While
Believe it or not, math is important. While it may have been easy to roll our eyes at our childhood schoolteachers, human behavior is quite predictable and math helps in
Mike Mimoso of Threatpost sat down with Vitaly Kamluk of our Global Research and Analysis Team during the Security Analyst Summit 2016 to discuss the latest discovery of the cross-platform
Long gone are the days when hackers would make malware just for fun. Nowadays malware is there not to simply cripple a PC, as it once was, but rather to
At the Security Analyst Summit 2016 our Global Research and Analysis Team (GReAT) has published extensive research on the Adwind Remote Access Tool (RAT). This malicious tool is also known
In 2015 we saw the rise of cybercriminals who rob banks directly. Several groups have mastered APT tools and techniques, dipping their hands into the “pockets” of at least twenty-nine
April 15 is a day that lives in infamy in the hearts of Americans. Now this date is not significant for any holiday, but rather the day that the Tax
What are social networks usually used for? For the most part, people use them to stay in touch with with friends, watch funny videos or catch with the latest news.
Since the dawn of mankind, our species has been full of dreamers with a quest for unlocking the unknown. Through the years, we searched for it in alchemy, ancient rituals
3D-printing is a unique technology — it lets you produce almost anything quickly and accurately. Moreover, items can be printed using different materials like plastic, metal, wax and so on.
It may only be a few years old, but Snapchat has already become one of the most popular Social Media apps out there. It’s been reported to have over 100
Nowadays, it seems like every company has a smartwatch. They can do everything from tracking your heart rate to making phone calls and gasp telling time. But did you know
What is an exoplanet? A common definition is ‘an Earth-like planet.’ However popular this definition may be, the true definition of an exoplanet is ‘any planet orbiting a star other
Almost all flagship smartphones have already been equipped with fashionable fingerprints scanners. Vendors claim that biometric sensors improve both user experience and security of mobile devices. But is it true?
Kaspersky Lab discovered Asacub, a banking trojan which started actively attacking Android users in January. Our experts managed to track its evolution step-by-step. A banking trojan is a type of