Gone in a Flash
No one should be using the dead technology, and any websites that still use it need an update.
612 articles
No one should be using the dead technology, and any websites that still use it need an update.
Can you transmit wireless data over a wired network? Evidence shows it can be done.
If we are to believe the science-fiction of the last century, the hackers of 2020 should have access to a rather curious toolkit.
Mobile apps can track your location and sell the data to third parties. What can you do about it?
If your company uses devices running Windows XP, this source code leak is yet another reason get them protected.
If you work with sensitive data, these obscure features of PDF, MS Office, and cloud documents are worth knowing.
Tips for thrifty gamers, such as how to protect yourself from malware when choosing a free-to-play game and filter out the garbage that is not worth your time and attention.
Cybercriminals are using steganography to hide their code and seek industrial data.
Colleagues from our subsidiary APROTECH found an unusual use for the KasperskyOS operating system in the IIoT sphere.
To mark the film’s 25th anniversary, we examine Hackers in terms of modern information security.
Supply-chain attacks through public repositories have become more frequent of late. Here’s how to deal with them.
Israeli experts claim that hundreds of millions of IoT devices contain critical vulnerabilities — and that’s the most conservative estimate.
Cybercriminals are distributing ransomware disguised as a tool for decrypting files encrypted by the STOP Trojan.
In addition to its primary targets, ransomware has infected some unusual devices.
Payment terminals and ATMs in remote locations require a special approach to security.
Attackers are infecting users’ computers with a backdoor posing as an Adobe Flash Player update.
Quantum computers are set to change our approaches to data encryption. When that will happen is not yet clear, but we do know when companies need to start preparing — right now.
Researcher Fabian Ising, speaking at the Chaos Communication Congress, showed the limits of PDF encryption’s strength.
End of support for Windows 7 is cause to analyze your information infrastructure carefully and identify weak spots.
Web threats are actively used in targeted attacks, so their neutralization should be an integral part of APT defense strategy.