1194 articles
For as long as I’ve been working in the security industry, which – in the spirit of full disclosure – hasn’t been a very long time, I have been shocked
Kaspersky Internet Security 2014 features the Quarantine component. We have received many questions about how this component works, so we are going to explain it in this tip. In
We talk about hackable consumer devices a lot here on the Kaspersky Daily. Generally though, the hacks are hypothetical, performed in controlled environments by computer scientists and professional hackers, some
At the end of 2012, we thought were about to observe the End of the world. In 2013, the end of Futurama was gravely approaching. 2014 will bring us the
Bitcoin is a cryptocurrency that owes much of its popularity to its rather volatile — and occasionally very high — price. Its potential for investors has made it a tempting
I understand your initial interest in this article, but a disclaimer: porn is not the main topic of discussion in this post. Rather, I will focus on a position at
Skype commercials make grandparents seem so happy, and why wouldn’t they be? Through the magic of the Internet, they can connect with their grandchildren and other loved ones instantly and
It may be the New Year, traditionally a time for new resolutions and goals, but we at Kaspersky Lab are continuing our dedication to standing by our promise to bring
Social engineering, sometimes called the science and art of human hacking, has become quite popular in recent years given the exponential growth of social networks, email and other forms of
2013 will be remembered by both security professionals and everyday people for the number of events that took place in information security. Various incidences, from Edward Snowden’s revelations to the
It is more important than ever during the holiday season that parents monitor and protect their children’s web activities. That’s because kids with toys on the brain – so basically
From takeoff to landing, the U.S. Federal Aviation Administration and its counterpart in the European Union have cleared the use of computers and mobile devices, though flyers will still be
A Hull, UK-based developer operating under the pseudonym DoctorBeet came to realize in early November that his LG Smart TV was actually gathering a quite a bit of information about
Neverquest is a new banking trojan that spreads itself via social media, email and file transfer protocols. It possesses the capacity to recognize hundreds of online banking and other financial
Times are tough and budgets are tight so when it comes to holiday shopping, everyone’s looking for a deal. However, if your quest for the ultimate savings threatens your safety,
It’s a weird time for mobile payments. Years ago it was thought that by now some parts of the world would be well on their way to if not fully
Strongly encrypted communications are secure and private communications (as long as there is no monkey-business going on in the way the encryption is implemented into communications software or protocols). Therefore,
There is an all-too common misconception that in order to become infected with web-propagated malware, you must visit sketchy parts of the Internet’s underbelly or a website within that broad
Sending off emails laden with malicious attachments is one of the most effective and widely relied upon methods for disseminating malware and infecting user-machines. It’s tried and it’s true.