How to Prevent Identity Theft
The general public should be well aware at this point that identity theft is increasingly common and has calamitous effects that are far more serious than the half-baked Melissa McCarthy
1438 articles
The general public should be well aware at this point that identity theft is increasingly common and has calamitous effects that are far more serious than the half-baked Melissa McCarthy
“Snapchat is a new way to share moments with friends,” reads the opening sentence of the temporary photo-sharing application’s “about us” page. The description is just vague enough to technically
LivingSocial informed its millions of customers over the weekend that malicious hackers had compromised the popular coupon site’s computer systems, exposing the names, email addresses, dates of birth, and encrypted
As Infosecurity Europe 2013 draws to a close, we take a look at the key takeaways, trending topics and buzzwords from this year’s event. To coincide with Infosec, Verizon released
We’re increasingly conducting our online lives through our mobile devices, be they smartphones or tablets, and while that’s a good thing for convenience, it comes with a price. Mobile platforms
Is Google’s wildly popular Gmail email service safe for work? The short answer is yes, for most of us at least, but there are circumstances in which Gmail is not
The Dow Jones Industrial Average fell precipitously Tuesday after a group of pro-Syrian hackers took control of an Associated Press Twitter account and tweeted that U.S. President Barack Obama had been injured
Infosec 2013 kicked off in London in style yesterday, as Chloe Smith MP, Minister for Political and Constitutional Reform, gave the inaugural keynote session on the UK’s cyber security strategy
This April saw an increase in the arrests of cybercriminals. Most cases were related directly to stealing money; interestingly, criminals prefer to steal smaller sums from hundreds of credit card
As many of you may know, Kaspersky Lab has been the sponsor of Ferrari both in the Challenge series and in Formula 1 since 2010. We are proud to announce
At this point, Internet Explorer, Google Chrome, Safari, and Mozilla Firefox are all modern, functional, and perfectly serviceable Web browsers. They each offer a robust set of interesting features, extensions,
The privacy and censorship conscious among us are certainly familiar with Tor. Short for “The Onion Router,” Tor is a free tool that keeps a user’s Web browsing private and
Unfortunately, data theft and credit card fraud have become common worries. We wanted to find out from our Facebook users if they have ever been targeted, so we asked if
All attacks on users’ computers were successfully blocked by Kaspersky Interenet Security 2013 in the independent test conducted by respected Austrian lab, AV-Comparatives. The test with the self-explanatory name “Real-World Protection
A group of Internet activists and privacy advocates penned an open letter to Microsoft earlier this year urging the company to shed light on just how confidential the conversations are
If we’re to believe all the headlines this week, then it appears that the one-time search giant Google has finally shipped off developer-models of Google Glass – their oft-mocked, thoroughly
Confusion ensued last week after a well-known security researcher identified a number of incredibly troubling security vulnerabilities in a popular Linksys router developed by Cisco Systems. The networking giant almost
Everyone loves the hands-free convenience that Bluetooth enables — some people love it a little too much and insist on wearing their Bluetooth ear pieces every waking hour like they’re
BlackBerry’s preeminent Z10 smartphone (and other devices running the BlackBerry operating system beyond version 4.5 for that matter) has a feature built-into its messaging service called “Show What I’m Listening
Today is the International Day of Human Space Flight, and we’ve decided to tell you a little about computers in space: what they’re like, what they do and how and
Kaspersky Lab analysts are currently investigating a series of targeted attacks against computer game publishers. It turns out that cybercriminals are stealing in-game currency, source code as well as digital