The scary side of big data
Abuse of big data means your worst paranoia scenarios come true, including, among other things, the endless government surveillance, insurance agencies despotism and employers tyranny. Like it or not, the
404 articles
Abuse of big data means your worst paranoia scenarios come true, including, among other things, the endless government surveillance, insurance agencies despotism and employers tyranny. Like it or not, the
Ashley Madison’s unplanned affairwith a group of hackers did not succeed. On August 18, 2015 the hackers posted nearly 10-gigabytes of stolen data online. Now anyone can download the records
Over the past few weeks, you have more than likely seen our research on Digital Amnesia. It is also quite possibly that you may have forgotten it, given your affliction
Merely 23 years ago Microsoft released Windows 3.1 operating system, Apple showed its first iPhone PDA, and Linus Torvalds released Linux under GNU license. Eugene Kaspersky published the book with
Please join us in welcoming updated security solutions for consumers — the best what Kaspersky Lab has to offer — Kaspersky Internet Security – Multi-Device and Kaspersky Total Security –
The ‘It wasn’t me’ phrase is not going to fly for users of the Ashley Madison dating site as the personal records of 37 million users have been stolen. Hackers
Connected devices give us access to an unlimited source of information — the Internet. They also serve as a reserve data storage for unmindful owners. Basically, the majority of smartphone
Vitaly Kamluk has more than 10 years of experience in IT security and now he holds the title Principal Security Researcher at Kaspersky Lab. He specializes in malware reverse engineering,
Why would cyber-criminals want to control your Facebook account? At the very least, they could “like” weird things and promote questionable goods and services on your behalf. However, Facebook is
An online password manager can make your life much easier by automatically entering individual passwords for each website and service you visit. It is a very convenient tool – unless
Local governments and law enforcement are becoming increasingly more reliant on networked surveillance cameras in order to monitor densely populated urban areas. London is a notorious example of urban surveillance,
Recently, Apple’s CEO Tim Cook delivered a speech on privacy and security during EPIC’s Champions of Freedom event held in Washington, DC. We want to share with you the 10
Recently Kaspersky Lab experts have found a sly method that allows fraudsters to steal personal information without access to the user’s login and password. The cyber criminals do not try
Threatpost journalists Chris Brook and Brian Donohue discuss security and privacy at Google I/O conference, the IRS and Carefirst BlueCross BlueShield Data Breach, Sections 215 of the PATRIOT Act and
Despite the fact that Google I/O is a developers conference, it always gets the attention of journalists and consumers as well. The reason is simple: this is when Google shows
Updated: Current principles for the processing of user data by Kaspersky Lab security solutions and technologies can be found here. While the cloud-based security approach is not a novelty, it’s
Everyone has heard of the German cipher machine called Enigma, mostly due to the fact its story fascinates all kinds of writers and filmmakers – most recently in the Oscar-nominated
World War II revolutionized many technologies, including those that shaped the modern InfoSec industry. Back then, methods and machines utilizing modern cryptography principles were often coupled with ‘amateur’ ciphering methods.
A group of academic security researchers remotely hacked and took control of a robot designed to perform telesurgery, according to the MIT Technology Review. Telesurgery — perhaps better known as remote
Big data techniques are used to solve numerous problems: to cure rare diseases, catch poachers in India or find the best time to top trees in New York. Insurance agencies
In theory, it’s common knowledge that “there’s no such thing as a free lunch”, but when it comes to practice, some forget about the ‘free lunch’ proverb and prefer another