Thanks to the work of security researchers, the latest release of Chrome patched a number of high-severity vulnerabilities. Source: Sophos
Thanks to the work of security researchers, the latest release of Chrome patched a number of high-severity vulnerabilities. Source: Sophos
China continues to host the most powerful supercomputer in the world— with 93 petaflop/s (quadrillions of calculations per second), the Sunway TaihuLight displaces Tianhe-2, the other Chinese supercomputer that claimed the No. 1 spot on the past six TOP500 rankings. But there’s something else. This supercomputer monster is not only powerful but it is also […]
What separates Twitter commoners from Twitter royalty? A blue badge indicating who has a special account verified by Twitter. These users usually include the most searched and include celebrities and influencers. Only 187,000 of the 320 million monthly Twitter users are a part of this distinguished club. In addition to giving them a higher rank, […]
If you recently checked “accept” to Whatsapp’s new Terms of Service and Privacy Policy, allowing the app to share your information with Facebook, then you have less than 30 days to change your mind. After causing quite the commotion, Whatsapp recently announced that users can now configure their privacy settings to not share data with […]
For malware writers, Google Play is the promised land of sorts. Once there, a malicious application gains access to a wide audience, gains the trust of that audience and experiences a degree of leniency from the security systems built into operating systems. On mobile devices, users typically cannot install applications coming from sources other than […]
Passwords are omnipresent in our everyday lives. Over the years, they have changed and adapted to continue protecting the websites, applications, devices and other online services that we use daily. With cybercrime on the rise, it is becoming more important to use passwords that are tough enough to withstand increasing security measures. Experts recommend (and sometimes […]
In early June, 2016, the Russian police arrested the alleged members of the criminal group known as Lurk. The police suspected Lurk of stealing nearly three billion rubles, using malicious software to systematically withdraw large sums of money from the accounts of commercial organizations, including banks. For Kaspersky Lab, these arrests marked the culmination of […]
From the activity bracelets employees wear to the television used for videoconferences in the meeting room, from your hard drive to the office cafeteria, every day there are more and more devices connected to the internet. These apparatuses seem harmless but in reality, they are “smart” devices that could be putting your company at risk. […]
Shadow Copies: Taking advantage of ransomware tricks There are not many ways to recover our kidnapped files from a ransomware attack without paying the ransom. If we are lucky (really lucky!) there might be some free tool to recover them, another option is to restore your files from your backup. However not everyone has a […]