
Renting a car abroad: survival guide
People are fond of completely different vacation styles: while some prefer to strategically limit the movements to the walkway from a beach to a hotel bar, others would be happy
570 articles
People are fond of completely different vacation styles: while some prefer to strategically limit the movements to the walkway from a beach to a hotel bar, others would be happy
While LTE networks are seemingly just now starting to take off and are not yet omnipresent, networking vendors and carriers are already fully engaged in a vivid discussion on 5G’s
Merchant vessels are continuously becoming bigger and getting more electronic systems. Seafarers often depend on technology data more than their own skills, knowledge, and senses. Crews are becoming smaller as computer
Much has been said about the VENOM vulnerability, the latest in an increasingly long line of bugs affecting vast swaths of the Internet. It’s an old-school bug of the relatively
Yesterday my favorite part of Kaspersky Lab — which is certainly the lab itself – grew, as we have opened our first European Research Center. It will be home to
In yet another example of smart medical device insecurity, it has emerged recently that a line of Hospira drug pumps are exposed to a series of remotely exploitable vulnerabilities that
The so-called book cipher has always been in favor with authors of spy novels and detective stories, who usually try to mimic reality but are not ready to feed hardcore
Everyone has heard of the German cipher machine called Enigma, mostly due to the fact its story fascinates all kinds of writers and filmmakers – most recently in the Oscar-nominated
World War II revolutionized many technologies, including those that shaped the modern InfoSec industry. Back then, methods and machines utilizing modern cryptography principles were often coupled with ‘amateur’ ciphering methods.
We’ve created an infographic that shows how the Kaspersky Lab flagship antivirus software has improved over the last several years.
A group of academic security researchers remotely hacked and took control of a robot designed to perform telesurgery, according to the MIT Technology Review. Telesurgery — perhaps better known as remote
Yet another APT of the ‘Dukes family’ is hitting high-profile targets, including the US government office. This time it’s CozyDuke, also known as CozyBear, CozyCar or “Office Monkeys” in honor
Information security is the cornerstone and essence of Israel. It was given serious attention long before the term of information security emerged in its traditional meaning in the 21st century.
SAN FRANCISCO — It’s an utterly played out platitude that the security industry is largely failing at its mission to protect computers and networks and all the nearly infinite data
Recently the United States Government Accountability Office published a report warning the Federal Aviation Administration that aviation faces cybersecurity challenges in “at least three areas”, including the protection of aircraft avionics used to
World nations are building fleets of unmanned robotic boats to perform missions above, on and under the water. Though there are only a few hundred unmanned maritime vessels in operation
Big data techniques are used to solve numerous problems: to cure rare diseases, catch poachers in India or find the best time to top trees in New York. Insurance agencies
Many people still think that malware is a software that completely disrupts the normal functioning of PCs. If your computer is working well, it means it’s not infected, right?
In theory, it’s common knowledge that “there’s no such thing as a free lunch”, but when it comes to practice, some forget about the ‘free lunch’ proverb and prefer another
Tech giants Intel and IBM are seeking to hire Bitcoin experts, but their interest appears to be focussed on the service’s public ledger rather than the cryptocurrency itself
In 2014 Kaspersky Lab products took part in many tests held by independent research labs. Our solutions achieved more first places than any competitor!