Five Popular Spam Scams
Everyone should know by now that there are, sadly, no members of deposed African royal families who want to share millions of dollars with you, no strings attached. What everyone
3882 articles
Everyone should know by now that there are, sadly, no members of deposed African royal families who want to share millions of dollars with you, no strings attached. What everyone
For most of us, April 1 is that one day each year we get to pull pranks and lie unashamedly to scare and confuse our friends and family — more
Imagine a world where, for every useful message, you also get three advertising, fraudulent or malicious ones in your mailbox. Suddenly the convenience of keeping in touch via email would
Facebook’s Like button practically begs to be clicked. It’s easy to “like” an innocuous post that pops in up in your News Feed, or send some Like Love to a
The good news for Apple fans is that the Cupertino technology giant issued a serious security upgrade yesterday by adding two-factor authentication to its users’ Apple ID accounts. The bad
Protect your children from the dangers of the Internet, set boundaries and time limits – ensure their online life is safe and fun with Kaspersky Internet Security.
Rootkits have been around for nearly 20 years now, allowing attackers to get access to and steal data from users’ machines without being detected for long periods of time. The
The latest round of the “CyberSecurity for the Next Generation” student conference was held at the National University of Singapore, Republic of Singapore, 21 – 23 March 2013. Hear from
The threats facing mobile devices are among the fastest growing and most serious dangers to the digital world. We gathered your questions on the subject and passed them on to
The latest round of the ‘CyberSecurity for Next Generation 2013’ student conference was held in Singapore on March 21-23. Young guests from Asia-Pacific, the Middle East and Africa took part
Isolation is a key concept in information security. For example, computers critical to services such as electric utilities or financial systems are often kept isolated, or air-gapped, from the Internet.
Congratulations to our first stage winner in Kaspersky Lab’s 7 Volcanoes contest, Jenni from the United Kingdom! As a geography teacher she is constantly teaching her students about wonderful, exotic
While each country has its own legislation and borders, cybercriminals perform their activities worldwide. International cooperation is essential to successfully stop them. As a result, Interpol and Kaspersky Lab have
Sergey Novikov, Head of the Global Research and Analysis Team for EEMEA, Kaspersky Lab, shares his thoughts and experiences regarding modern education in the cybersecurity field. Watch the exclusive interview
Various Russian media outlets are reporting that Microsoft’s incredibly popular internet phone service, Skype, which is widely relied upon as a secure means to communicate confidential or otherwise sensitive information,
Kaspersky Lab’s Automatic Exploit Prevention technology scans the vulnerabilities in your programs and block any suspicious actions before they cause any harm.
With the increasing importance of online life, each of us faces the need to use more and more web services: social networks, e-mail, online banking and so on. Each service
Attackers trying to infect your computer with malware capable of remote access don’t necessarily seek money; some cybercriminals are just having fun. The most valuable items to these invaders are
Despite cries and outrage from the security industry that passwords are an inadequate form of authentication for access to computers and online services, so many mechanisms depend on these secret
The steady growth in the number of malicious programs targeting the Android operating system was one of the most significant IT security issues in 2011. Today, almost 90% of mobile
Whenever you read a news headline about the arrest or conviction of a cybercriminal, you can guarantee that the bulk of the investigative work was done by the work of