All You Need to Know about Google Drive
A little over a year ago, most of us woke up one day and discovered that Google Docs was gone, replaced by this weird new thing called Google Drive. Then
1147 articles
A little over a year ago, most of us woke up one day and discovered that Google Docs was gone, replaced by this weird new thing called Google Drive. Then
If computers themselves are relatively new in the grand scheme of things, then mobile devices are incredibly new. And likewise, just as we’ve spent the better part of the last
On June 19, Opera Software, the developer of one of the most popular Internet browsers- mainly used on mobile devices, admitted that the company’s internal network infrastructure was attacked and
If there’s one group of people who love vacation more than the vacationers themselves, its thieves. Tourists and travelers have always made easy marks for criminals, but now that everyone
You do not often read “repentance” articles in the media when authors describe as they did something evidently stupid and paid for it. Last year one such piece was published
Afraid you missed out on some of our blog posts this June? Not to worry, we’ve compiled highlights from our most popular Kaspersky Daily articles for you! Take a look:
Imagine the following situation: there is huge disbursement of emails with innocent looking MS Word document attachments sent to the mailboxes of a company’s employees. Some of these employees have
We’re continuing to watch how law enforcement agencies around the world are progressing in the fight against cybercrime. They’ve been able to keep jailing hackers, both for minor cybercrimes like
Chances are you have more digital assets than you think. Everything from email and social media accounts, to online financial accounts, domain names, digital media collections (music and movies), and
Have you ever wondered what a hacked computer, email address, or other online account is even worth? Sure, it seems pretty obvious that there’d be some serious value in a
The recent incident of personal data being leaked from Facebook’s servers is just one more demonstration that even the best cloud services are not flawless. Therefore, every user should have
In late 2011, it emerged that Chinese hackers had thoroughly compromised the United States Chamber of Commerce, perforating the lobbying-group’s networks with a devastating chain of backdoors. Chamber officials admitted
When we think of information security, we tend to think of external hackers and cyber-criminals fighting their way inside an organisation’s network to steal its information. Clearswift commissioned some research
There’s been something of an uneasy consensus among experts that Apple’s iOS platform is the most secure option among mobile operating systems almost exclusively because of the closed-off nature of
It can be very tempting to instantly share the most exciting moments of your vacation with relatives and maybe make your friends a little bit jealous. That’s why we usually
The Internet has revolutionized the way we book our holidays. Unfortunately it is also enabling fraudsters to prey upon people’s desires to have a perfect vacation, so stay vigilant and
Another day, another online service adds two-factor authentication to its list of features. This time it was Evernote, the cloud-based note-taking service that hackers managed to compromise and use as
Today it’s difficult to imagine our lives without the Internet. The Internet gives access to modern music, new movies and videos, educational dictionaries, encyclopedias and articles. Children around the world
Not long ago, Twitter was a novelty social media site that average users thought was silly. Now the microblogging tool is a vital news source and publishing platform, letting anyone
The owners of smartphones running Android and iOS sometimes enter into heated discussions as to whether it’s worthwhile to perform the mysterious procedures known as rooting and jailbreaking their devices.
Everything is about the cloud these days, but as we increasingly store our personal and professional data on remote servers it is essential to know that nothing is 100 percent