
Hack the lights: The Italian Job in terms of cybersecurity
We trace how the perception of hackers has evolved based on the classic traffic-light-hacking scheme in three versions (British, American, Indian) of The Italian Job.
1250 articles
We trace how the perception of hackers has evolved based on the classic traffic-light-hacking scheme in three versions (British, American, Indian) of The Italian Job.
Research seeks to understand key drivers of the future of work.
Among its other troubles, 2020 will be remembered as a year of explosive growth in ransomware infections.
We have updated our Open Threat Intelligence Portal, a tool for experts and security analysts.
Jeff and Dave talk innovation with Kaspersky CBO Alex Moiseev.
To bypass antiphishing technologies, malefactors can use legitimate e-mail service providers, or ESPs — but dangerous letters aren’t unstoppable.
If your company uses devices running Windows XP, this source code leak is yet another reason get them protected.
Security training aimed at IT teams, service desks, and other technically advanced staff.
If you work with sensitive data, these obscure features of PDF, MS Office, and cloud documents are worth knowing.
Our new research explores the role innovation plays within large organizations, and where key decision makers see innovation going next.
The digital lifestyle is incredibly useful for customers. But for big industries, it now means building a whole new structure to protect tons of data and operational security for better cyber attack detection.
Cybercriminals are using steganography to hide their code and seek industrial data.
Cybercriminals are employing a sophisticated malicious framework whose tools include some leaked from Hacking Team.
The legend of the Pied Piper of Hamelin has been used before as an allegory of real, tragic events. Here’s our take.
Our colleagues researched economic aspects of cybersecurity and reported on the dominant trends.
Before the thieves can enjoy them, the proceeds of cybercrime have to jump through a few hoops. We discuss the complexities involved.
Phishing links in e-mails to company employees often become active after initial scanning. But they still can and must be caught.
The CVE-2020-1472 vulnerability in the Netlogon protocol, aka Zerologon, lets attackers hijack domain controllers.
Our industrial security experts have conducted a study on the state of industrial cybersecurity in a pandemic.
To mark the film’s 25th anniversary, we examine Hackers in terms of modern information security.
Our experts analyzed sophisticated attacks and APT campaigns targeting Linux, and they provided some security recommendations.