A Skype Trojan steals your CPU power
Kaspersky Lab experts have discovered a new trojan virus attacking skype users. Find out how to recognize it before you fall victim.
1147 articles
Kaspersky Lab experts have discovered a new trojan virus attacking skype users. Find out how to recognize it before you fall victim.
We all want the newest and best of everything. That’s why every time the latest device comes out we rush to upgrade our suddenly outdated version. Less than 6 percent
Kaspersky Internet Security’s secure keyboard activates automatically when using bank or payment websites and every time you enter a password on any website. Keep your passwords and financial data safe.
Just a few years ago, it was rare to find someone who had more than one or maybe two Internet-connected devices in their home. Now, you’d have to look high
Everyone should know by now that there are, sadly, no members of deposed African royal families who want to share millions of dollars with you, no strings attached. What everyone
The good news for Apple fans is that the Cupertino technology giant issued a serious security upgrade yesterday by adding two-factor authentication to its users’ Apple ID accounts. The bad
Rootkits have been around for nearly 20 years now, allowing attackers to get access to and steal data from users’ machines without being detected for long periods of time. The
The threats facing mobile devices are among the fastest growing and most serious dangers to the digital world. We gathered your questions on the subject and passed them on to
Isolation is a key concept in information security. For example, computers critical to services such as electric utilities or financial systems are often kept isolated, or air-gapped, from the Internet.
Attackers trying to infect your computer with malware capable of remote access don’t necessarily seek money; some cybercriminals are just having fun. The most valuable items to these invaders are
Crime in the virtual world has long been a tough nut to crack for law enforcement agencies and the courts. Getting to the bottom of a cyberattack and then gathering
Creating backup copies is one of the most reliable methods of safeguarding important data: whatever happens to your valuable files, you will always have a copy at hand. This is
User friendliness and ease of use are up there with reliable protection when deciding on IT security solutions. One might think that these two requirements are incompatible – a complex
The number of those affected by identity theft is on the rise again according to recent research. A quarter of consumers that received data breach letters last year wound up
The overwhelming majority of businesses today are encouraging employees to adopt “mobile” working practices, meaning that work can be done wherever, whenever and from whatever device – smartphone, tablet or
RSA is the major event in security. Basically it’s like the Big 8 International Conference or, better yet – the Olympics of security – except nobody is throwing spears and
WordPress has become one of the more popular web platforms, both for personal and professional websites, because it is simple to use and yet very flexible. But this popularity also
Social networks have become major targets for attackers, who value the implied trust that users have in their friends’ accounts. Compromising a large number of accounts on one of the
Home PCs and laptops remain an important place for storing sensitive information, including personal emails, logins and passwords, photos, financial data and more. Of course, this information needs to be
Massive multiplayer online games — MMOGs — have become hugely popular in recent years, which means, unsurprisingly, that they’ve become big targets for attackers. These games create alternative universes, often
Aside from the endless hours we spend on Gchat at work, online chatting is mostly a kid’s game. But the responsibility falls on adults to know the basics of safe