Big Brotherhood: who tracks us on the Web
The Internet continues to find its way into the private lives of its users. Here, we brief you on the most common methods of online tracking.
4250 articles
The Internet continues to find its way into the private lives of its users. Here, we brief you on the most common methods of online tracking.
Banks continue to lose a lot of money because of carders and seek ways to ensure their customers are safe. Let’s take a look at the latest methods of bank card protection and how they may evolve.
Understanding something means getting the correct answers to questions. In this post, we have picked – and answered – three questions that need to be asked to ensure business data security.
Whether you’re buying or selling a secondhand Apple device, you can be fooled by criminals. We have gathered tips on how to minimize your chances of being taken by such frauds.
It can be hard for businesses to keep in mind everything they need to do to be protected. We have identified five trends in cybersecurity that are affecting businesses, directly or indirectly, at a formidable level.
As is, a QR code can quickly take you to a site or another resource but not necessarily to the one you really want to visit. Thus Kaspersky Lab offers a free and safe QR scanner!
Have you ever wondered how a typical office would look in a decade or so? Allow us to take you on a small tour of the most interesting office concepts.
With Kaspersky Small Office Security there’s no need to waste a lot of time ensuring your business is a cyber safe environment.
In part one of our series, we discussed tech used by bank card ‘seekers’. Today, we’ll cover how criminals carry out the most dangerous skimming processes.
“A single cyberincident can kill a business” may sound like an exaggeration, but it is not. In this blog post we prove it with two different stories.
New version of CTB-Locker, a ransomware that uses Tor and Bitcoin to evade detection and takedowns, should be avoided at all costs.
What is the best way to start assessing your company’s cybersecurity issues? First, look around at what you have.
The top privacy data leaks in 2014 include: data breaches at Target and Home Depot, hacks of JP Morgan and Barclays banks, and leaks at Orange and Dropbox.
As part of its Project Zero security initiative, Google disclosed a few vulnerabilities in Windows, some ahead of a planned patch. Google simply adhered to its “publicize in 90 days after private vendor disclosure” policy, but where are end users’ interest in this “game of flaws”?
Researcher discovers that Progressive Snapshot tools lack any real security controls and could be exploited by attackers to hack cars.
As a student, I had a part-time job offering PC support services. Now, when visiting relatives who aren’t good at servicing their computers, I often have to apply my expertise once again.
Kaspersky Lab has just released its forecast of digital realities for 2045. Big changes are anticipated for the entire IT world and businesses. Security challenges will change as well.
Gartner named Kaspersky Lab a “leader” in the Magic Quadrant for Endpoint Protection Platforms rating for the fourth consecutive year. In this new podcast, Brian Burke, Kaspersky Lab’s global director of market intelligence and analyst relations, explains why Gartner’s Magic Quadrant matters.
Security reporters Brian Donohue and Chris Brook discuss security and privacy headlines from the first few weeks of the new year.
What are the key differences between Kaspersky Total Security and Kaspersky Internet Security? Which is the best choice for you? Which protects better? Let’s take a closer look.
Comparing the worst passwords of 2014 with the infamous top 50 passwords from the Gawker Media breach in 2010.