Renting a car abroad: survival guide
Since the holiday season is upon us, we prepared a list of simple tips to help you minimize risks when renting a car abroad.
Since the holiday season is upon us, we prepared a list of simple tips to help you minimize risks when renting a car abroad.
Virtual reality experiments have been continuously carried out since user PCs learned to process graphics. Step by step, the tech has become capable of creating virtual worlds that look relatively
While LTE networks are seemingly just now starting to take off and are not yet omnipresent, networking vendors and carriers are already fully engaged in a vivid discussion on 5G’s
Ransomware is a kind of malware that steals users’ files and exacts a ransom from its victims. The most effective approach is to encrypt the files and offer decryption keys
Much has been said about the VENOM vulnerability, the latest in an increasingly long line of bugs affecting vast swaths of the Internet. It’s an old-school bug of the relatively
The Chinese-language Naikon advanced persistent threat group is targeting military, government and civil organizations located in and around the South China Sea, which is an increasingly contentious hot-bed of territorial
Once you look as the airplanes moving on a map you get a feeling that it’s sheer Brownian motion. Of course, in reality, it’s not the case: aircrafts keep to air tracks all the time
Our own implementation of a cloud security model is called Kaspersky Security Network. And here we’ll explain how it actually works
Kaspersky Lab opens its new European Research Center in London
It emerged recently that certain Hospira drug infusion pumps contain dangerous and easily exploitable security vulnerabilities.
A legendary Soviet spy, Richard Sorge, is famous for conveying the exact date of the German invasion into the Soviet Union, and for letting the command know Japan had no plans of attacking the USSR in the Far East.
Five lessons from the story of the Enigma cryptographic machine which are still relevant.
During WW2 modern cryptography principles were often coupled with ‘amateur’ ciphering methods. Curiously, the latter ones often proved to be equally reliable.
Let’s imagine the things we would have to leave behind as a brand new world of driverless cars is evolving at a full speed (besides the enjoyment of driving itself)
We’ve created an infographic that shows how the Kaspersky Lab flagship antivirus software has improved over the last 10 years.
The tech which seemed something from science fiction yesterday, are entering our everyday lives. One of such gizmos is direct neural interfaces.