Security Implications of Tethering Your Mobile Device
Say you’re in a public space and you want to use your laptop to go online but there’s no WiFi available. Well, if you have your mobile device, you may
1438 articles
Say you’re in a public space and you want to use your laptop to go online but there’s no WiFi available. Well, if you have your mobile device, you may
Meet Max, the IT Security Manager. See how Max, with the help of Kaspersky Lab, tackles the IT security battle in this new animation. Find out how IT security takes
Does Kaspersky write malware or create cyberweapons? Let’s find out! Our undercover reporter tries to trick the Kaspersky team into saying they support cyberwar; but they hate cyberweapons so much
Last week, Kaspersky Lab’s student conference “Cybersecurity for the Next Generation” in Ecuador came to its conclusion. The program committee chose the three best papers from six presentations, with a
All industries, including IT, need emerging talent and ambitious specialists joining their ranks, bringing with them fresh ideas that help create a foundation for future innovations. Every year millions of
It may not seem like it when you look at the various threats facing consumers online right now, but experts say that we may have reached a point where we’ve seen
Up until recently it was completely fine to unlock your cell phone for use on a third-party carrier’s network. But that changed on Jan. 26 when a new law went
Every couple of months, seemingly, the world gets up in arms about the latest changes to Facebook’s privacy policy. But Facebook isn’t the only social media site that collects and
The password has become the black sheep of the security world, ostracized for its inability to actually protect users’ accounts and the laughable ease with which attackers can crack or
From its then-revolutionary touchscreen interface to the somewhat ill-fated Siri voice control, Apple’s iPhone has always set the standard for mobile devices since its first version hit the stores in
Software vulnerabilities are published every day, by the hundreds, and most users don’t think much about them, aside from them time it takes them to update their software. But when
Twitter is an essential part of anyone’s brand these days, whether you’re a small company, a media mogul or someone who simply likes to share her views with anyone willing
Heads up, you secretive Facebook users who have made yourself unsearchable on the world’s most popular social networking platform: You can hide no more. Facebook announced updated privacy features —
When a browser asks you if you want it to store, save, or remember your password and you allow it to do so, it actually does store your password in
The first thing you want to be aware of when discussing security features on Google’s Chrome browser is that many of the best options aren’t built into the browser, but
On Christmas Eve we counted the results of our light-hearted survey on Facebook. Users were asked to say which piece of malware, if any, they most associated with Santa. It
Although some people dismiss it as a minor concern that’s exaggerated by over-protective parents, cyberbullying can have devastating effects on children and families. While traditional bullying can involve physical and
If you’re on Twitter, you know the Fail Whale: When Twitter’s servers get overloaded (it happens surprisingly often) an image appears of a sleepy whale being hoisted out of the
Computers have advanced in the last 20 years from building-sized mainframes to smartphones that can fit in your pocket (and have become infinitely more capable, to boot), yet we use
Everyone knows you should have antivirus applications running on your work and personal computers, but far fewer people take seriously the threat of malware attacks to their mobile devices –