
10 tips to protect your privacy online
Online privacy is an issue that worries a lot of people. Here are ten basic tips on how to protect your personal data online.
3956 articles
Online privacy is an issue that worries a lot of people. Here are ten basic tips on how to protect your personal data online.
Kaspersky Lab’s Protected browser helps you make online transactions securely. It uses orange frame colors to tell users if something is wrong.
What does Google know about you and me? Let’s check it with the new “About me” tool.
There are some interesting findings in our Q3 spam report.
Do ATMs employ a secret trick to call the police, and should you trust anything written in CAPS?
According to a study by Kaspersky Lab and B2B International, every cyber-incident is costly to businesses: In 2015, losses due to cyberattacks for SMBs averaged $38K.
Sometimes even cybercriminals go fishing. They hunt for a special goldfish — our personal data. So, what can you do to protect yourself from phishing?
The Internet is full of thoughts and perceptions, both true and false. Let’s investigate whether the Internet legend about hotel key cards storing guests’ personal information is fact or fiction.
Introduction Running a datacenter involves a plethora of complex tasks, of which security is just one. But the security of virtual environments and data storage in particular is critical to
Why it’s unsafe to take phones in bed and into the bathroom
Kaspersky Lab’s quarterly IT Threat Evolution report is in and so is Kaspersky DDoS Intelligence Report for Q3 2015. Let’s take a look into what happened this last quarter.
It’s believed, that we own GPS, Bluetooth, Wi-Fi and CDMA invention to Hedy Lamarr. Let’s find out if this is true and what exactly the actress contributed to the development of these technologies
As a follow-up to our recent foray into ransomware, we’re pleased to offer a fundamental practical guide on how to deal with ransomware.
Think a photo of your boarding pass is innocent when posted online? Think again.
“Good-faith” car hacking and mobile device “jailbreaking” are now on their way to becoming legal in the U.S. The Library of Congress’ triennial exemptions to the anti-circumvention rules within the Digital Copyright Millennium Act (DCMA), released on October 27th.
Since you started to connect all those Things to the Internet, creating IoT, your home is no longer your fortress by design. Now attackers can spy on your kid through a baby monitor or break into your house by fooling your ‘smart’ security lock.
Criminals can use VoLTE to cause connection failure, subdue voice calls, or strip the victim’s mobile account of money.
The Internet can be a mess unless you have the right map. Here are 7 great maps for you to bookmark.
An FBI representative speaking at the 2015 Boston Cyber Security Summit gave a piece of advice on ransomware which the San Francisco Chronicle called “disquieting”: he said it’s recommended victims
Nearly every person has ever faced a cyber criminal’s activity; many have become victims of banking frauds. So, how does it happen?