How Internet ads work, part 2
We continue our series on the mechanics of Internet advertising. This time we will focus on the the various types of ads and how, precisely, they work.
277 articles
We continue our series on the mechanics of Internet advertising. This time we will focus on the the various types of ads and how, precisely, they work.
How criminals use fake Wi-Fi hotspots to steal data, and how you can use our solutions to protect yourself.
When Google announced Allo, we thought the search giant was finally paying attention to users’ concerns about privacy. Reality turned to be quite different.
Powerful chatbots can replace real-life communication — and take over the world.
Lynch law, loss of basic privacy, disgusting marketing, digital identity theft — how else can facial recognition be misused?
If you own an Apple device, spend a few minutes setting up your System Location Services. You’ll protect your privacy and lengthen battery life.
Did you know that some apps on your iPhone or iPad track your location, access your camera and calendar, and more? In Part 1 of this story, we show you how to turn off tracking using iOS’s privacy features.
Accurate identification of people’s faces is a very human process but computers are gaining on our processing. A look at what’s going on now and what we’ll see soon.
Aggressive moral crusaders search for porn actresses accounts on VK.com and cyberbully them along with their friends and families.
The Kaspersky Daily team checks if FindFace can really find users on a social media site with one image taken on the street and if it is possible to hide from it. Some interesting peculiarities detected!
How everyone and his dog online make the big data tyranny raise.
They say Facebook severely violates users’ privacy. Is it true and why European authorities claim that?
We have previously discussed what VPN is. Now let’s review its implementations and their advantages and drawbacks.
Our bionic man Evgeny Chereshnev talks on the biochip in his hand and how it makes you a part of the Internet of Things
What exactly is a VPN? There has been a lot of buzz around it, but why do we need it?
So your social media photos are public, great. Ever wonder what could happen when they get stolen?
Vendors claim, that a fingerprint sensor in your smartphone is user-friendly and really secure. But it’s not true.
People encrypt their communications so strongly that governments cannot access it when there is a need. Is it really bad?
Popular online messengers cannot be considered secure enough, yet people continue to use them to exchange private and critical information.
Fingerprints and iris scans are insecure and can be stolen to compromise your identity.
The world is a reality TV show and sometimes we cannot resist the opportunity to snap up our piece of fame. We are posting funny pics of ourselves to amuse