Planning Your Digital Afterlife
For most of us, our digital devices are incredibly important possessions. They hold our most important personal information like photos, passwords and account info, and travel with us on a
1438 articles
For most of us, our digital devices are incredibly important possessions. They hold our most important personal information like photos, passwords and account info, and travel with us on a
If you’re reading the Kaspersky Daily with any degree of regularity than you likely already know that it is very possible to hack the modern automobile. In fact, I wrote
Everyday millions of computers solve the same problem; these machines try to check if you are actually you and not some other person. The most popular tool to do that
We are constantly on our mobile devices or desktops and much of this time is spent using apps or online games. In our latest poll, Kaspersky Lab asks, how much you’ve
Go ahead and add insulin pumps and pacemakers to the ever-expanding list of computer-like-devices that contain bugs and are therefore vulnerable to exploit. That’s right, that little metal thing inside
Kaspersky Internet Security has shown 100% efficiency in blocking Zero-day threats in independent test. Criminals constantly look for backdoors and vulnerabilities to discreetly infect your PC with malware while you
On the night of June 5, 2013 a coalition led by the FBI and Microsoft broke up a botnet of two million connected PCs that was being used by cybercriminals
Las Vegas – On the last day of July and the first day of August, a Roman empire-themed hotel and casino in the the Mojave Desert played host to what
Click on the image below to answer this week’s poll.
Did you miss a few of our articles in July? Catch up now with our monthly roundup of the latest Kaspersky news and tips! Send Gmails That Not Even Google
If you haven’t heard by now, three days before Jay Z released his most recent album “Magna Carta… Holy Grail” in July, Samsung Galaxy device owners could download it via
Protecting our identities and finances online is hard enough as is, but it’s even harder when you’re trying to relax on vacation in an unfamiliar place – particularly if that
There are no borders for cybercriminals. To be more precise, they strategically use borders to steal in one country, cash out in another and spend stolen money in a third
For many, summer vacations used to mean leaving all the trappings of home behind. But now that we’re more inseparable from our devices than ever before, we never leave everything
The popular microblogging website, Tumblr, announced a breach in its security for iOS customers last week. The company asked all users of its iPhone and iPad app to change their
Excerpt: “Eugene Kaspersky talks about Ferrari, technological leadership and Russian F1 pilots“ There is no F1 racetrack in Moscow, nevertheless, it was easy to hear the engines roar behind the
If your friend were looking for a job and asked you if they should come work where you work, would you recommend your company to them? Would you say nice
For a very long time, Apple and its pseudo-religious user-base prided itself on being a platform free of malware; those days are inarguably and unequivocally over. Its emergence as the
Google provides some pretty strong security controls like two-factor authentication in order to prevent hackers from hijacking your account and other controls that allow you to recover your account in
Whether or not it is possible to hack a car depends almost entirely on the kind of car you drive. I, for example, drive a 1998 Honda Accord, and I’m
Summer is a great time for vacation for everyone but criminals, for whom it’s among the busiest times of year. That’s because travelers make for easy marks, and their high