Tip of the Week: How to check suspicious files for viruses
So far we’ve talked about the different ways you can configure our anti-virus products: for example, you now know how to auto-scan a USB stick and limit children’s access to
3883 articles
So far we’ve talked about the different ways you can configure our anti-virus products: for example, you now know how to auto-scan a USB stick and limit children’s access to
Last week members of CMS Drupal received terrifying news regarding a very serious problem – a massive data breach. The breach included leaked usernames, email addresses, users’ countries of residence
It’s summer, that time of year where we go on vacation, take lots of pictures — and, of course, upload them to Facebook, Instagram and Twitter. And because we want
Exciting news! Olga Rumyantsev has conquered Mount Elbrus as she continues on her quest to climb the 7 tallest volcanoes in the world. This is the fourth highest volcano Olga
You may want to think twice about using your iPhone as a wireless hotspot. A group of researchers from the Department Informatik at Friedrich-Alexander-Universität Erlangen-Nürnberg in Germany developed software allowing
A little over a year ago, most of us woke up one day and discovered that Google Docs was gone, replaced by this weird new thing called Google Drive. Then
If computers themselves are relatively new in the grand scheme of things, then mobile devices are incredibly new. And likewise, just as we’ve spent the better part of the last
On June 19, Opera Software, the developer of one of the most popular Internet browsers- mainly used on mobile devices, admitted that the company’s internal network infrastructure was attacked and
The ancient stratovolcano, Elbrus, is Europe’s highest peak and takes its place amongst the “Seven Summits,” a must for any self-respecting mountaineer. So naturally Olga Rumyantseva could not pass it
As an experienced Internet user, you know how to stay safe online by avoiding dangerous links, restricting children’s online activity, protecting sensitive data and performing quick on-site authorization. Still, threats
If there’s one group of people who love vacation more than the vacationers themselves, its thieves. Tourists and travelers have always made easy marks for criminals, but now that everyone
The large American supermarket chain, Raley’s Family of Fine Stores, which is comprised of 120 stores in California and Nevada, became the target of a “complex criminal cyber-attack.” The company
The cyber threat landscape is constantly evolving and keeping up with those changes is an intense project. Kaspersky Lab has a team of research experts who are relentless in sniffing
There is a common belief that Apple operating systems are well protected against cybercriminals. This belief used to be true, but Apple users are quickly becoming an attractive target for
You do not often read “repentance” articles in the media when authors describe as they did something evidently stupid and paid for it. Last year one such piece was published
Blockbusters, like Star Wars or Independence Day, tell us breathtaking stories in which space blasters, force fields and traveling faster than the speed of light are all commonplace. But there
Kaspersky Labs security products have taken home multiple awards from independent testing groups in recent weeks, and that trend continued with the announcement that its Android smartphone solution, Kaspersky Mobile
Afraid you missed out on some of our blog posts this June? Not to worry, we’ve compiled highlights from our most popular Kaspersky Daily articles for you! Take a look:
We’ve already told you how to prevent your kids from accessing unwanted data online with tutorials on how to block access to specific websites and how to control file downloading. But aside from
Imagine the following situation: there is huge disbursement of emails with innocent looking MS Word document attachments sent to the mailboxes of a company’s employees. Some of these employees have
According to Kaspersky Labs research, 34 percent of worldwide Internet users were attacked by malicious programs in 2012. As always, the most popular entries for attackers were widely used programs