Security features in Apple OS X Yosemite
Let’s take a look at the security features in the new version of Mac OS X – Yosemite. Apple certainly makes a decent effort.
240 articles
Let’s take a look at the security features in the new version of Mac OS X – Yosemite. Apple certainly makes a decent effort.
Your primary email account is often the master key that can provide backup access to all other accounts, which is why you must be particularly careful with it.
Phishing is the most developed form of Internet scamming. Let’s explore the topic in order to better understand why it became so prominent and what measures one can take to avoid a phishing attack.
Online shopping is typically a money-saving move in and of itself, but there are tactics that you can use to keep even more cash in your pocket.
Beware of phishing, malware, spam and other online scams based on the extremely popular ALS Ice Bucket Challenge.
Internet scammers are quite smart and greedy, and know how to disguise their traps, but there are always some ways to find out where these traps are.
Is social engineering beatable? Just as much as you can beat any other kind of deceit. Actually, social engineering is about “exploiting flaws in a human hardware”.
July is over and that means it’s time to look back and observe the latest results of the battle between cybercriminals and prosecutors.
School’s out for summer and the kids need watching. Here are some tools that can help you do the job – at least while they’re on the Internet.
Criminals invented Cryptolocker, spying malware and Zeus banking Trojan. We have new protection against them.
When a computer is operated by a child, it should be protected against a whole new set of threats. Some popular security solutions fail to provide sufficient protection.
Many of the websites that claim to be World Cup streaming services will harm your system and can steal your credit card information, if you let them.
According to research by Kaspersky Lab, 22 percent of phishing scams on the web target Facebook.
One FIFA-related phishing site included a supposedly downloadable ticket, which turned out to be a malicious form of the Banker Trojan that steals sensitive data surrounding users’ online banking data.
Whether you’re a victim or a witness, there are a number of sources you can submit online threat information to in order to make the Internet a safer place.
OpenID and OAuth are protocols responsible for those “Login with Facebook” and “Authorize with Google” buttons you see on almost every site nowadays. Of course, there is a hack for that™, but you don’t need neither panic nor change your password. Read on for our simple action plan.
Be it Candy Crush Saga, EVE Online, QuizUp or World of Tanks, there are risks associated with your gaming online. Know and avert them.
We begin our synopsis of this week by looking forward to next week when Microsoft will – at long last – discontinue its support of the once ubiquitous, forever vulnerable,
You have a particularly high chance of encountering fake news on April Fool’s Day. In addition to joking headlines of mainstream media outlets, you can encounter a link to dedicated
Last week was something of a slow week for those of us that spend our days writing about computer security news. However, while there may not have been an abundance
A few weeks ago Kaspersky Lab experts published a new study on the evolution of phishing over the past two years. Here is a summation of what the study found: