
The Big Four Banking Trojans
Banking trojans are like rats, you kick a trashcan and six of them go scurrying off in every direction. Most of them you’ll read about once and never again. But
1195 articles
Banking trojans are like rats, you kick a trashcan and six of them go scurrying off in every direction. Most of them you’ll read about once and never again. But
The Wi-Fi alliance, an almost absurdly large consortium of communications, technology, and manufacturing companies, has launched an initiative aiming to strengthen the security and reliability public wireless hotspots. Known as
You’re in the middle of doing something important on your computer when an annoying alert pops up telling you it’s time to perform a software update. However, instead of hitting
Cybercriminals are constantly looking for new ways to manipulate victims online. One of your strongest lines of defense against having your personal data and your money fall into the hands
When we enter the adult world, we tend to put a lot of care into building and cultivating our reputations. The way we present ourselves and the way others perceive
It is well established that the rapid proliferation of mobile devices has presented a number of unique security concerns – especially given the increasingly blurry line separating personal devices and
Go ahead and add toilets to the increasingly long list of hackable consumer devices we’ve been compiling here on the Kaspersky Daily. In fact, one of the researchers at this
Instagram, Facebook, Twitter, Snapchat, Bebo, Vine, MySpace – the list goes on and on. It seems like new social media platforms are added to the fold on a daily basis,
Almost everyone knows computers need virus protection. Knowledge about safety and privacy-friendly online behavior is much less widespread, though, and extensive media coverage of Edward Snowden’s leaks regarding U.S. government
Online shopping, online money transfers and online banking save us a lot of time and make our lives easier. However, these same technologies also make life easier for cybercriminals by
That wireless router in your living room is essentially the hub for your entire home network. Nearly all of your devices are going to route through it and into you
You have probably already heard about the security of iOS and how Apple controls its App Store. In fact, they are doing an exceptional job since the release of iOS,
You might think that, much like a pirate going into battle, the more weapons you have at your disposal for your protection the better: cutlass in one hand, pistol and
Protecting your home network is as daunting a task as you make it. If your home network consists of a wireless router and a laptop, then it’s pretty easy to
For most of us, our digital devices are incredibly important possessions. They hold our most important personal information like photos, passwords and account info, and travel with us on a
As the end of summer approaches, we begin gearing up to get our kids ready to head back to school. Soon pools will be closing, sandals will be packed away
Even if you follow all the Cardinal Rules of system security — you regularly update your operating system and programs, avoid spam like the plague and never click through on suspicious
Go ahead and add insulin pumps and pacemakers to the ever-expanding list of computer-like-devices that contain bugs and are therefore vulnerable to exploit. That’s right, that little metal thing inside
On the night of June 5, 2013 a coalition led by the FBI and Microsoft broke up a botnet of two million connected PCs that was being used by cybercriminals
Click on the image below to answer this week’s poll.
Did you miss a few of our articles in July? Catch up now with our monthly roundup of the latest Kaspersky news and tips! Send Gmails That Not Even Google