Legal malware and cyber-mercenaries
Hacking and espionage are hardly crimes for the secret service, but rather are a part of their everyday work. But imagine what could happen if their tools end up in wrong hands.
1194 articles
Hacking and espionage are hardly crimes for the secret service, but rather are a part of their everyday work. But imagine what could happen if their tools end up in wrong hands.
”Dear Chairman, dear Vice Chairman, dear members of the board, let me present to you the annual report… Oops… Just a moment, we are having some technical issues…”
October is National Cybersecurity Awareness Month. Tell us how you promote cybersecurity or how you stay safe online and you could win.
Phishing is the most developed form of Internet scamming. Let’s explore the topic in order to better understand why it became so prominent and what measures one can take to avoid a phishing attack.
Even when your iPhone is in your hands or on the table, it can reveal some of your secrets to strangers. Here are 10 tips to prevent this from happening.
With the release of iOS 8, Apple claims it can’t access the personal data on your iPhones and iPads and it can’t give it to authorities. But it seems there’s a catch.
A new poll shows Americans care overwhelmingly about digital privacy.
The final month of summer wasn’t full of cybercriminal stories, but law enforcement groups around the world still found and punished some evildoers.
Like it or not, your children are going to be on the web. Kaspersky’s award-winning parental controls let you monitor their activity and block them from any sites that you choose.
Follow ten important tips to defend yourself against password leaks.
Tor is an online browsing portal that keeps your web activity completely anonymous.
A survey reveals the motivations behind hacker attacks, showing that they are not afraid of consequences.
On September 9th, Apple showed some new devices and its own payment system, which utilizes an NFC chip, Touch ID sensor and Passbook app. So we had a try to find out how it works, what it gives us and how well this system is protected.
My Kaspersky is a multi-device security management tool that lets users control the security products on all of their devices remotely in one place.
Your data is the finest treasure on your computer. Protect it the way the secret service protects a president, create a robust defense system where an antivirus will be just the last line of defense.
Don’t want your private photos or credit card posted somewhere on the web? You should rethink your approach to cloud services then.
Expert reviewers are declaring KIS 2015 the best version yet, and one of the best AV products on the market.
It would be nice to think that it would take a lot more than an overeager amateur hacker like Seth Green’s character from the 2003 movie “The Italian Job,” to bring traffic to a screeching halt.
Preparing to watch your child trundle off to school with these expensive devices in their backpacks will be a lot easier if you guard against the many perils that can threaten them – theft, malware and unwanted Internet browsing chief among them.
We have bought our very own Blackphone to check its security firsthand.