Tip Of The Week: How to Easily Activate Settings for Age-appropriate Content
If you have been following our blog for a while, you might already know how to block games by age rating, how to limit children’s access to specific applications, and
3886 articles
If you have been following our blog for a while, you might already know how to block games by age rating, how to limit children’s access to specific applications, and
While the breach itself seemed only to impact those of us in the United States, chances are you’re aware that the American retail giant Target suffered an enormous data breach
To summarize Costin Raiu, the director of Kaspersky Lab’s research arm, the vast majority of malicious files are what he calls crimeware — computer programs deployed by cybercriminals seeking to
Gartner has just released their 2014 Magic Quadrant for Endpoint Protection Platforms. I’m very pleased to announce that, for the third year in a row, Gartner has included Kaspersky Lab
About 39% of commercial companies in the past two years have experienced information security incidents generated by vulnerabilities in legitimate software. This data is presented in the survey “Global Corporate
You might be aware that public transportation is the most likely place to get your valuables stolen. Your wallet is not the only target for pickpockets, they also aim for
Learn step-by-step instructions on how to protect your device from theft.
We are proud to announce that Kaspersky Internet Security, the flagship home user product of Kaspersky Lab, has received the ‘Product of the year’ award from the independent testing lab
For as long as I’ve been working in the security industry, which – in the spirit of full disclosure – hasn’t been a very long time, I have been shocked
The Christmas and New Year holidays, alas, were not a pretext for any real decrease in the number of information security incidents, as experts and users continue to face malware
Kaspersky Internet Security 2014 features the Quarantine component. We have received many questions about how this component works, so we are going to explain it in this tip. In
We talk about hackable consumer devices a lot here on the Kaspersky Daily. Generally though, the hacks are hypothetical, performed in controlled environments by computer scientists and professional hackers, some
We are starting a series of articles “Small business security stories” in which executives of formally small business companies talk about the role of IT and particularly data protection in
At the end of 2012, we thought were about to observe the End of the world. In 2013, the end of Futurama was gravely approaching. 2014 will bring us the
The name Dropbox has become synonymous with intrapersonal large file sharing, as has Google+ Drive (formerly Google Docs) and, to a lesser degree, Microsoft’s SkyDrive. But these options aren’t for
Bitcoin is a cryptocurrency that owes much of its popularity to its rather volatile — and occasionally very high — price. Its potential for investors has made it a tempting
I understand your initial interest in this article, but a disclaimer: porn is not the main topic of discussion in this post. Rather, I will focus on a position at
Reports emerged earlier this week that the Starbucks’ iOS mobile application could be exposing the personal information of any customers that downloaded it. To their immense credit – especially considering
Information security sites are brimming with discussions surroudning a new program, which is classified as 150% malicious since it causes great harm and spreads malice like all blockers do. It
You can locate your misplaced phone using any device connected to the Internet such as a tablet. Simple as A-B-C.