Evernote and LinkedIn Join Two-Factor Party
Another day, another online service adds two-factor authentication to its list of features. This time it was Evernote, the cloud-based note-taking service that hackers managed to compromise and use as
1438 articles
Another day, another online service adds two-factor authentication to its list of features. This time it was Evernote, the cloud-based note-taking service that hackers managed to compromise and use as
An agenda-packed conference with bright minds and eager speakers paired with an equally excited audience set the stage for Kaspersky Lab’s first annual Cybersecurity Government Forum in Washington, D.C. on
In case you weren’t following us during May, here is a list of the most popular articles that were published on Kaspersky Daily last month. Beware of Snapchat The wildly
We recently wrote about the conspicuous lack of privacy discussion at Google’s recent I/O Conference in San Francisco. While it’s true that there wasn’t much talk of privacy at the
The owners of smartphones running Android and iOS sometimes enter into heated discussions as to whether it’s worthwhile to perform the mysterious procedures known as rooting and jailbreaking their devices.
Consumers looking for ways to ensure their computers and devices are safe from illicit threats rampant on the Internet might should know that Kaspersky Lab’s long legacy of offering constant
Twitter has recently caught up with competitors like Facebook and Google by improving user protection with two-factor authentication. This will help us all forget about those much talked about account
We are continuously watching how law enforcement agencies around the world fight cybercrime. With help from the IT industry and experience gained over the years, these agencies have been able
Ever heard complaints about computer slowdown caused by running antiviral protection? It’s not relevant anymore, that is, if you use a modern antivirus that has been thoroughly optimized for the
Everybody talks about HTTPS and being careful with credit or debit cards online, but what makes you think your cards are safe offline? I can’t speak for anyone other than
Computers, initially created for military cipher breaking, give everyone an almost perfect way to keep our secrets totally private – through encryption. For a long time strong encryption was only
Google Glass was among the main attractions at the Mountain View, California search giant’s developer-centric I/O conference in San Francisco last week. We had high hopes that Google would address
We want you to be fully aware of the latest changes in the threat landscape. Our friends at securelist have compiled a quarterly report of digital threats and we’ve included
Microsoft (and Adobe for that matter) released a slew of security updates in the May 2013 edition of their monthly patch Tuesday release. As always, if your machine isn’t set
Getting to the bottom of independent AV comparative testing – who to believe and how to make the right decision. We respect the right of any user to choose a
When the U.S. Government comes poking around the world’s major Internet companies asking for customer data, Verizon, AT&T, Apple, and Yahoo are not particularly interested in protecting the general public,
Permanent deletion by default after a predetermined amount of time is the gimmick that drove Snapchat users to upload more than 150 million photos a day in April. Problematically, Snapchat’s
Kaspersky Lab has signed an agreement with Qualcomm Technologies to protect smartphones and tablets.
Given the deftness of malicious hackers, the bar-lowering impact of easily accessible markets for automated cybercriminal kits, and the increasing number of online services and people connected to the Internet,
If we really wanted to thoroughly discuss ‘HTTPS’ and Digital Certificates, then we’d need to talk about cryptography, but don’t worry, because we’re going to go ahead and spare you
Virtual Private Networks, or VPNs for short, have become increasingly essential of late as we more often access sensitive data from remote locations — and as the threat of having our