The perils of fake technical support
Credit to Author: Tatyana Sidorina| Date: Thu, 18 Apr 2019 09:40:07 +0000
Fake technical support websites and accounts in social networks pose a real danger. How to spot and avoid them.
Read MoreRSS Reader for Computer Security Articles
Credit to Author: Tatyana Sidorina| Date: Thu, 18 Apr 2019 09:40:07 +0000
Fake technical support websites and accounts in social networks pose a real danger. How to spot and avoid them.
Read MoreCredit to Author: Alex Perekalin| Date: Wed, 17 Apr 2019 11:42:14 +0000
Trojanized HID devices as well as surveilling or malicious cables are serious threats that can be used to compromise even air-gapped systems.
Read MoreCredit to Author: Jeffrey Esposito| Date: Wed, 17 Apr 2019 10:42:04 +0000
This episode brings you stories of Amazon Alexa, a UK government BCC error, and so-called smart-car apps with hard-coded passwords.
Read MoreCredit to Author: Leonid Grustniy| Date: Tue, 16 Apr 2019 12:15:33 +0000
What makes startups dependent on data protection for success?
Read MoreCredit to Author: Pavel Shoshin| Date: Mon, 15 Apr 2019 10:00:10 +0000
Our proactive security technologies uncovered an attempt to exploit another zero-day vulnerability in win32k.sys.
Read MoreCredit to Author: Jeffrey Esposito| Date: Fri, 12 Apr 2019 15:51:15 +0000
A look at the complexities of public attribution and why nation-states doing it will have real-world implications.
Read MoreCredit to Author: Eugene Kaspersky| Date: Fri, 12 Apr 2019 14:00:24 +0000
Eugene Kaspersky’s thoughts on security and safety of self-driving cars.
Read MoreCredit to Author: Kaspersky Team| Date: Thu, 11 Apr 2019 07:19:51 +0000
The Microsoft Office threat landscape, and the technologies that help us catch related zero-day exploits, were the focus of this talk at the SAS 2019 conference.
Read More