The Perils of Securing the Computer in Your Pocket
If computers themselves are relatively new in the grand scheme of things, then mobile devices are incredibly new. And likewise, just as we’ve spent the better part of the last
3898 articles
If computers themselves are relatively new in the grand scheme of things, then mobile devices are incredibly new. And likewise, just as we’ve spent the better part of the last
On June 19, Opera Software, the developer of one of the most popular Internet browsers- mainly used on mobile devices, admitted that the company’s internal network infrastructure was attacked and
The ancient stratovolcano, Elbrus, is Europe’s highest peak and takes its place amongst the “Seven Summits,” a must for any self-respecting mountaineer. So naturally Olga Rumyantseva could not pass it
As an experienced Internet user, you know how to stay safe online by avoiding dangerous links, restricting children’s online activity, protecting sensitive data and performing quick on-site authorization. Still, threats
If there’s one group of people who love vacation more than the vacationers themselves, its thieves. Tourists and travelers have always made easy marks for criminals, but now that everyone
The large American supermarket chain, Raley’s Family of Fine Stores, which is comprised of 120 stores in California and Nevada, became the target of a “complex criminal cyber-attack.” The company
The cyber threat landscape is constantly evolving and keeping up with those changes is an intense project. Kaspersky Lab has a team of research experts who are relentless in sniffing
There is a common belief that Apple operating systems are well protected against cybercriminals. This belief used to be true, but Apple users are quickly becoming an attractive target for
You do not often read “repentance” articles in the media when authors describe as they did something evidently stupid and paid for it. Last year one such piece was published
Blockbusters, like Star Wars or Independence Day, tell us breathtaking stories in which space blasters, force fields and traveling faster than the speed of light are all commonplace. But there
Kaspersky Labs security products have taken home multiple awards from independent testing groups in recent weeks, and that trend continued with the announcement that its Android smartphone solution, Kaspersky Mobile
Afraid you missed out on some of our blog posts this June? Not to worry, we’ve compiled highlights from our most popular Kaspersky Daily articles for you! Take a look:
We’ve already told you how to prevent your kids from accessing unwanted data online with tutorials on how to block access to specific websites and how to control file downloading. But aside from
Imagine the following situation: there is huge disbursement of emails with innocent looking MS Word document attachments sent to the mailboxes of a company’s employees. Some of these employees have
According to Kaspersky Labs research, 34 percent of worldwide Internet users were attacked by malicious programs in 2012. As always, the most popular entries for attackers were widely used programs
Extortion, blackmail and ransom requests have always been cornerstones of criminal activity. In today’s global internet economy, criminals are adapting their techniques by attempting to extort money from people using
We’re continuing to watch how law enforcement agencies around the world are progressing in the fight against cybercrime. They’ve been able to keep jailing hackers, both for minor cybercrimes like
Chances are you have more digital assets than you think. Everything from email and social media accounts, to online financial accounts, domain names, digital media collections (music and movies), and
14 finalists, 10 countries, 5 regional heats: and one London Final. We are still flying high from all the excitement generated by the ideas, innovation and inspiration that underpinned the
Have you ever wondered what a hacked computer, email address, or other online account is even worth? Sure, it seems pretty obvious that there’d be some serious value in a
Imagine the following situation: you have configured Kaspersky PURE to get the maximum protection for your computer, customized the settings of each component, specified which data should be backed up