Safe online shopping and banking on your Mac
Even Mac users take risks when shopping online. Fortunately, we can help.
73 articles
Even Mac users take risks when shopping online. Fortunately, we can help.
A criminal ring in India posed as technical support and tricked many people, but they couldn’t fool David Jacoby, our senior security researcher.
Everything you need to know about botnets: how they work, why they are dangerous and how to stay safe.
An unwitting army of connected devices caused an insane disruption of major Internet sites. IoT users need to wise up.
Confused and wondering how Bitcoin and blockchain work? In this post we break it all down for you.
Acecard is one of the most advanced banking trojans. It’s capable of overlaying more than 30 banks’ and financial systems’ apps and is spread via Google Play.
Why Steam users often fall victims to scams and frauds and how to avoid it.
Vendors claim, that a fingerprint sensor in your smartphone is user-friendly and really secure. But it’s not true.
Lack of cybersecurity knowledge can lead to the loss of money due to online banking fraud. Follow these eight rules to protect your money from cybercriminals
Do you think that you have nothing to hack whatsoever? Bad news, guys: everyone has something hackable!
With all of the hacks in the news, you may feel scared to shop online. Kaspersky Lab can ease your fears with the Safe Money feature of Kaspersky Internet Security 2016.
Our today’s weekly news digest covers three stories about the mistakes coders make when programming robots, the way other people exploit those design flaws, and then the reckoning.
The new trend on IFA 2015 is all about integrity and security. Meet Kaspersky Lab’s observations from the trade show.
A new piece of ransomware has emerged and it’s going after a younger crowd by encrypting only those files on infected machines that relate to online game play
Let’s talk about the dangers of cross-border payments with plastic cards and security flaws in payment systems architecture.
It can be hard for businesses to keep in mind everything they need to do to be protected. We have identified five trends in cybersecurity that are affecting businesses, directly or indirectly, at a formidable level.
Apple malware targets iOS by infecting OS X machines and then swapping legitimate apps for malicious ones as soon as an iOS device connects via USB.
Your primary email account is often the master key that can provide backup access to all other accounts, which is why you must be particularly careful with it.
A while ago we “celebrated” 10 years since the first smartphone malware emerged. While we made the first Symbian antivirus in 2004, it doesn’t mean that we had no mobile security products before that. It was hard to unearth and boot an antique handheld from early 2000s, and even harder to find, install and launch our old software. Yes, it’s long obsolete, but there’s a reason for all these efforts. Read about it in our new blog post.