How to React to and Report Online Fraud
Whether you’re a victim or a witness, there are a number of sources you can submit online threat information to in order to make the Internet a safer place.
689 articles
Whether you’re a victim or a witness, there are a number of sources you can submit online threat information to in order to make the Internet a safer place.
OpenID and OAuth are protocols responsible for those “Login with Facebook” and “Authorize with Google” buttons you see on almost every site nowadays. Of course, there is a hack for that™, but you don’t need neither panic nor change your password. Read on for our simple action plan.
Similar to car crash testing, you’re better off avoiding performing PC security tests yourself. Here’s what the pros have to say for a better, more-trustworthy approach.
Top Apps to protect you from prying eyes, mischievous kids, thieves, natural disasters, forgetfulness and of course malware.
Have sensitive contacts to hide? There is a way to conveniently hide them on your smartphone.
In this video tutorial, we explore Facebook’s settings, explaining what each feature does and showing users how to configure their profile and ensure privacy.
In this video tutorial, we explore the Facebook settings pages, explaining what each feature does and showing users how to securely configure their profiles
Get rid of old gadgets while keeping your data secure and private.
A series of security tips and guidelines to follow if you are planning to conduct money transfers online.
Last week, we had a look at private messengers; today, we decided to compile a list of good apps to protect you, your iPhone and its content.
Today, regular instant messengers are hard to trust when it comes to privacy. There are, of course, safer alternatives, but are they able to substitute Skype and WhatsApp?
The Internet has made planning and booking a vacation easier than ever before. But beware, there are lots of scammers who are ready to pounce on unsuspecting victims booking their vacations this time of year.
Sometimes we have no other option than to leave our things unattended. Imagine the situation: you are alone at the beach on a hot summer day and cannot resist the
Cryptographic hash functions are a ubiquitous tool in computing, used for everything from identity verification to malware detection to file protection.
There is a serious flaw called Heartbleed in OpenSSL encryption library that could expose user login credentials, communications content, an more
On October 25, 2001 Microsoft launched its newest operating system solution: Windows XP. In just three days, Microsoft sold over 300,000 boxed XPs: the new OS featured a number of
Spring is when we reboot our life cycles, paring down and cleaning up our lives in anticipation of bigger, better things to come with warmer weather – and there’s no
You have a particularly high chance of encountering fake news on April Fool’s Day. In addition to joking headlines of mainstream media outlets, you can encounter a link to dedicated
If you use Windows 8.1 and you like its multicolored and dynamic modern interface, you can install the Kaspersky Now application. It allows you to view the protection level
Internet companies are doing their best to protect users and bring them better security solutions. The same goes for Google, which recently announced that the Chrome browser will now be
“Gadget” has recently become an extremely popular word. We now use a wide range of gadgets, read the latest news from this sphere in various blogs and websites, and eagerly