Tip Of The Week: How to Easily Activate Settings for Age-appropriate Content
If you have been following our blog for a while, you might already know how to block games by age rating, how to limit children’s access to specific applications, and
1147 articles
If you have been following our blog for a while, you might already know how to block games by age rating, how to limit children’s access to specific applications, and
For as long as I’ve been working in the security industry, which – in the spirit of full disclosure – hasn’t been a very long time, I have been shocked
We are starting a series of articles “Small business security stories” in which executives of formally small business companies talk about the role of IT and particularly data protection in
The name Dropbox has become synonymous with intrapersonal large file sharing, as has Google+ Drive (formerly Google Docs) and, to a lesser degree, Microsoft’s SkyDrive. But these options aren’t for
Bitcoin is a cryptocurrency that owes much of its popularity to its rather volatile — and occasionally very high — price. Its potential for investors has made it a tempting
Reports emerged earlier this week that the Starbucks’ iOS mobile application could be exposing the personal information of any customers that downloaded it. To their immense credit – especially considering
A few weeks ago Kaspersky Lab experts published a new study on the evolution of phishing over the past two years. Here is a summation of what the study found:
It may be the New Year, traditionally a time for new resolutions and goals, but we at Kaspersky Lab are continuing our dedication to standing by our promise to bring
In December 2013 information security incidents proliferated, unfortunately. Even if the number of incidents remained within the average values, their significance, alas, was not moderate. The interests of millions of
We have already talked about keyloggers – malware tools that intercept and record keyboard inputs. Every time you type your credentials to enter a social network, a payment system or
Social engineering, sometimes called the science and art of human hacking, has become quite popular in recent years given the exponential growth of social networks, email and other forms of
The Problem At present, even very small companies store information that could cause irreparable damage to their financial future if it fell into the wrong hands. An example of this
Sony Corp. underwent a large-scale fiasco in April 2011, when a security breach affected tens of millions of people. The intruders stole the personal data of many users along with
We all know that working on a computer for hours can affect our health. Our eyes and back need rest regularly. However, sometimes we are too busy and we forget
2013 will be remembered by both security professionals and everyday people for the number of events that took place in information security. Various incidences, from Edward Snowden’s revelations to the
It is more important than ever during the holiday season that parents monitor and protect their childrens’ web activities. That’s because kids with toys on the brain – so basically
The Problem We often hear from small business owners that the modest size of their companies provides them with “invisibility protection”. Employees believe that their organization and its activities are
In everyday life we encounter a lot of negative things, such as violence, aggression, and brutality. It is often impossible to protect children from such information in the real world,
We’re officially into the month of December, which means another month of posts has passed. If you missed anything from November, not to worry, we’ve rounded up some highlights to
In-app purchases are the Holy Grail of revenue for app producers, especially those who make free gaming apps. The hook is that you love the game so much once you
Neverquest is a new banking trojan that spreads itself via social media, email and file transfer protocols. It possesses the capacity to recognize hundreds of online banking and other financial