Fake Antivirus: What Are They And How Do You Avoid Them?
Cybercriminals are constantly looking for new ways to manipulate victims online. One of your strongest lines of defense against having your personal data and your money fall into the hands
1424 articles
Cybercriminals are constantly looking for new ways to manipulate victims online. One of your strongest lines of defense against having your personal data and your money fall into the hands
It is well established that the rapid proliferation of mobile devices has presented a number of unique security concerns – especially given the increasingly blurry line separating personal devices and
Go ahead and add toilets to the increasingly long list of hackable consumer devices we’ve been compiling here on the Kaspersky Daily. In fact, one of the researchers at this
Nowadays, quantum systems really do exist, with some of them reaching the stage of commercial sales. Quantum computers raise and answer new questions in the security field.
Almost everyone knows computers need virus protection. Knowledge about safety and privacy-friendly online behavior is much less widespread, though, and extensive media coverage of Edward Snowden’s leaks regarding U.S. government
Another month has quietly slipped away and you’ve found yourself wondering if you’re all caught up on our articles from September. Not to worry, we’ve rounded up our top posts
September has come to an end and it’s time to check up on the progress that has been made by police forces and security experts in finding hackers and cybercriminals
Kaspersky Lab has adopted its wildly successful ZETA Shield from its corporate solutions and is implementing the technology into Kaspersky Internet Security 2014, providing even more robust security for everyday
Online shopping, online money transfers and online banking save us a lot of time and make our lives easier. However, these same technologies also make life easier for cybercriminals by
Kaspersky Lab’s Brian Donohue rounds up the latest security news from the month of September 2013. [audio https://media.kasperskydaily.com/wp-content/uploads/sites/92/2017/06/06045555/podcast_september_Brian.mp3] Download podcast for offline listening
Passwords, the de facto authenticators, represent a serious security weakness for a number of reasons, chief among those is that humans quite simply tend to create bad passwords in order
An apparent flaw in Apple’s new operating system for its mobile devices allows anyone to access a user’s contact information and social media accounts without entering the security code to
That wireless router in your living room is essentially the hub for your entire home network. Nearly all of your devices are going to route through it and into you
The world has been up in arms about the expansive and invasive reach of the U.S. government’s National Security Agency (NSA) ever since the world was introduced to Edward Snowden
Samsung, maker of handsets and all devices tech-related, has created a secure Android environment called Knox, which aims to resolve the laundry list of security problems facing IT teams as
Apple strengthens user protection in their new flagship smartphone meaning biometric identification might finally go mainstream. Is it good or bad, and what are the potential consequences? First, we’ll try
Nowadays, people are using several devices in their households- PCs, smartphones and tablets that all have access to the internet. However, are all these devices receiving equal protection? In our
You have probably already heard about the security of iOS and how Apple controls its App Store. In fact, they are doing an exceptional job since the release of iOS,
People tend to think that multiple antiviruses are better than just one. In fact it’s quite the opposite
A housewarming party is always a great occasion, especially when the house is spacious, well-located and filled with happy people! Our HQ, where 1,600 of our 3,000 employees work, is