Quantcast
Channel: encryption – Kaspersky official blog
Browsing all 23 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Who to trust: Different types of SSL certificates

A secure connection is encrypted and therefore safe; an unprotected one isn’t. Easy, right? But where do certificates come from, and what’s the difference between SSL and TLS? What does a digital...

View Article



Image may be NSFW.
Clik here to view.

SynAck ransomware: The doppelgängster

Malware tends to evolve, with crooks adding new functions and techniques to help it avoid detection by antivirus programs. Sometimes, the evolution is rather rapid. For example, SynAck ransomware,...

View Article

Image may be NSFW.
Clik here to view.

An uncertain path to quantum supremacy: Notes from RSA

Uncertainty. That’s the best word to describe the feeling I had roaming around the halls of RSA Conference 2018, taking part in sessions focused on quantum computers and perceived dangers for...

View Article

Image may be NSFW.
Clik here to view.

Rakhni Trojan: To encrypt and to mine

We recently posted that ransomware is giving way to miners at the top of the online threat rankings. In line with this trend, the Trojan ransomware Rakhni, which we’ve been watching since 2013, has...

View Article

Image may be NSFW.
Clik here to view.

KeyPass: Ravenous ransomware

We recently wrote a post about how a downloaded book or mod for a game can be accompanied by something nasty. Over the past few days, we’ve been observing a fresh case study in the shape of KeyPass...

View Article


Image may be NSFW.
Clik here to view.

Transatlantic Cable Podcast, Episode 74

In episode 74 of the Transatlantic Cable podcast, some of their colleagues from overseas join Dave and Jeff to talk about travel and cybersecurity. From top tips on what to do before travelling,...

View Article

Image may be NSFW.
Clik here to view.

Transatlantic Cable podcast, episode 82

An underlying theme of this week’s podcast is cheating. This comes across in many ways — from cheating the system to theft and online gaming. We kick off the 82nd edition of the Kaspersky Lab...

View Article

Image may be NSFW.
Clik here to view.

Transatlantic Cable podcast, episode 95

Episode 95 of the Kaspersky Transatlantic Cable podcast touches on encryption’s power, burger joints, Google Chrome restrictions on ad-blockers, and more. To start things off, Dave and I tackle a pair...

View Article


Image may be NSFW.
Clik here to view.

Internet in space: Is there Net on Mars?

By now, the Internet has reached basically all corners of the Earth — and not just its surface. Being online onboard an airplane is already old hat, and even the International Space Station has a...

View Article


Image may be NSFW.
Clik here to view.

Quantum supremacy is almost uncertainly here

A quantum computer from Google solved a task that the best supercomputer in the world cannot. The news made quite a splash — and then, the report was retracted. The retraction, which the Financial...

View Article

The Three Little Pigs and cybersecurity

In the olden days, people paid far better attention to cybersecurity than they do now. I am sure that most of the folk tales that have survived to this day were invented specifically to prepare...

View Article

Image may be NSFW.
Clik here to view.

Can you read an encrypted PDF?

According to the file format’s specifications, PDF supports encryption, using the AES algorithm with Cipher Block Chaining encryption mode. Therefore — at least, in theory — whoever encrypts a PDF file...

View Article

Image may be NSFW.
Clik here to view.

Transatlantic Cable podcast, episode 132

To kick off the 132nd edition of the Kaspersky Transatlantic Cable podcast, Dave and I discuss an IoT issue for pet owners. Owners of second-generation Petnet SmartFeeders saw their feeders stop...

View Article


Quantum computers 101

Last fall, Google announced that it had achieved quantum supremacy. If that sounds a bit abstract and not relevant to the average user, think again. What the Google team did, essentially, was use a...

View Article

Zoom 5 moves toward security

Not so long ago, we explained how to configure Zoom to make it safer to use. However, technologies can develop very rapidly, especially those in the spotlight. One such case is Zoom, whose developers...

View Article


Quantum computers and cryptography for dummies

Quantum computers are capable of very quickly solving very complex problems, such that even a supercomputer would be stumped for a long time. True, most of these problems are currently somewhat removed...

View Article

Image may be NSFW.
Clik here to view.

Transatlantic Cable podcast, episode 153

To start episode 153 of the Kaspersky Transatlantic Cable podcast, Dave and Jeff look back on four years of the No More Ransom initiative, of which Kaspersky is one of the four founding members. In its...

View Article


What end-to-end encryption is, and why you need it

In recent years, communications services ranging from WhatsApp to Zoom have announced their implementation of end-to-end encryption. What does that mean? Well, the idea of encryption is pretty...

View Article

Image may be NSFW.
Clik here to view.

Telegram security and privacy tips

Facebook’s WhatsApp recently updated its privacy policy, causing many disgruntled users to switch to rival messengers, among them Telegram. Thanks largely to this exodus, Telegram added 25 million new...

View Article

7 tips for storing confidential data | Kaspersky official blog

There’s no such thing as a business that doesn’t have sensitive data. Even a small retail company has documents with employees’ personal details that legally must remain confidential, for example. Bank...

View Article
Browsing all 23 articles
Browse latest View live




Latest Images