
Keep your child safe: beware of dangerous content
While surfing the Internet, children may come across web pages containing inappropriate information. IT solutions can help protect children from such content.
3956 articles
While surfing the Internet, children may come across web pages containing inappropriate information. IT solutions can help protect children from such content.
In the dead of the night, a guy called my Mom and said in a weary voice: “Mom, I got into an accident. I’m in trouble. I’ll pass the phone to the officer, he’ll fill you in”. Here’s what happened next.
The global workforce is increasingly going mobile: 37% currently, up to 50% by 2020. There are more actively used mobile devices in any more or less developed country than there are adult citizens, so clearly “mobility” is something related to us all.
Everybody knows about flying drones, but there are also swimming and diving drones that patrol ports and ships, demine shores and so on. Let’s take a closer look at maritime robots.
Big data helps to catch child abusers, drug dealers, and terrorists, and allegedly it also helped to locate Bin Laden.
Flightradar24 allows you to track what’s happening to any particular aircraft taking a family member or friend to their destination. Let’s find out how this service works.
With so many games and apps available for download on your mobile devices, it’s important to remember that not all of them are suitable for children. That’s why you should be monitoring what your kid installs.
Kaspersky Lab experts have discovered a new APT campaign that targets government institutions, mainly in the APAC region. It was named “Hellsing” after the string containing the project directory name found within the attack components’ code.
Security is a tough matter for small businesses for multiple reasons; startups and small entities tend to save on their IT wherever possible, and that’s where security failures are common.
Kaspersky Lab and the Dutch cyber-police created a tool that restores files encrypted by CoinVault ransomware.
The cybersecurity has become the everyone’s business, and it raises the demand for continuous update of information for everybody, both high-level security professionals and common corporate users. And especially for the latter, since it is them criminals attack most of the time.
A peculiar botnet codenamed Simda has been taken down as a result of a joint operation between a number of law enforcement agencies and commercial organizations.
Recently Interpol, Microsoft and Kaspersky Lab revealed and the shut down of a huge botnet which zombified about 770,000 PCs worldwide. Check this story out and then check your PC
Threatpost security reporters Chris Brook and Brian Donohue discuss the Github DDoS, Dyre banking malware, privacy threats, hacking and more
An annoying story of ‘free’ WiFi hotspots by St. Petersburg-based Smart WiFi. Nothing is for free, though, as you end up paying with your vk.com credentials
Every security vendor has a portfolio of advanced “anti-malware technologies” that make its products good and even better than all the rest.
The word “IoT” (Internet of Things) has been a buzz word for several years now. It has become the era when more home electronics and cars are connected to the
Children who use mobile devices can be more vulnerable to cyber threats because they are free to surf the Internet at any time or place, without adult supervision.
Over the last few years we have witnessed a number of high-profile, large scale security breaches with quite dramatic consequences, such as massive leaks of personally identifiable data.
A New York artist made an exhibition out of making a single private and anonymous cell phone call outside the scope of government spying. Here’s how he did it:
Phishing used to be an exotic threat, but that was years ago when malicious worms dominated the arena. Much has changed since then, and today phishing routinely hits hard – especially