
671 articles
Think a photo of your boarding pass is innocent when posted online? Think again.
“Good-faith” car hacking and mobile device “jailbreaking” are now on their way to becoming legal in the U.S. The Library of Congress’ triennial exemptions to the anti-circumvention rules within the Digital Copyright Millennium Act (DCMA), released on October 27th.
Since you started to connect all those Things to the Internet, creating IoT, your home is no longer your fortress by design. Now attackers can spy on your kid through a baby monitor or break into your house by fooling your ‘smart’ security lock.
Criminals can use VoLTE to cause connection failure, subdue voice calls, or strip the victim’s mobile account of money.
Nearly every person has ever faced a cyber criminal’s activity; many have become victims of banking frauds. So, how does it happen?
Early next year Kaspersky Lab will host yet another Security Analyst Summit, this time in Tenerife, Spain.
Stop what you are doing and check your privacy settings on Facebook.
With all of the hacks in the news, you may feel scared to shop online. Kaspersky Lab can ease your fears with the Safe Money feature of Kaspersky Internet Security 2016.
Google’s Android OS is a vulnerable system. Developers make it worse by not providing critical patches in time.
Konstantin Goncharov explains the bottom line of tech giants’ epic fails in the new edition of cybersecurity news digest.
How to use a special app to protect your kids from unwanted calls and mobile fraud and be sure that your child is not playing online instead of studying.
What if you could be sure that your kids use Internet safely while their mobile phones are protected from fraud, unwanted calls and SMS? All you need for that is Kaspersky Safe Kids!
Tips and methods of hacking global surveillance: makeup, special clothes, eyeglasses and more.
A recent study of attitudes toward information risk shows that one in four (24%) IT specialists are concerned about the growing complexity of IT infrastructures and see this trend as a threat to security.
What is the difference between real and theoretical threats?
Have you ever considered your smart office from an IT security viewpoint? Did it occur to you that by equipping your office with devices designed to provide life’s comforts, cybercriminals are handed even more opportunity to gain access to your corporate information and even to cause physical damage?
Today’s smartphones are full-fledged computers much more powerful than the desktops you used 10 years ago. Your device is very likely to contain data the cybercriminals are after, like banking data.
Today’s weekly news digest covers the stories about various mistakes in coding, and how they can be used for different purposes, including earning money.
Your legitimate copy of Angry Birds 2 may be infected with malware that steals your private data. How could this happen?
Cyber-literate users possesses a variety of good habits, which protect them online and offline. What are these traits?