
What is Two-Factor Authentication? Where Should You Use It?
Enabling two-factor authentication makes it significantly harder for an attacker to compromise your online accounts, but what is it and when should you use it?
740 articles
Enabling two-factor authentication makes it significantly harder for an attacker to compromise your online accounts, but what is it and when should you use it?
Apple has announced new versions of its operating system. OS X and iOS become closer, gradually merging into a single environment. How well is it protected?
May 2014 appears to be very stormy and volatile in regards to information security. Still overshadowed by Heartbleed and Windows XP “official demise” from April, it has brought a lot of troubles on its own.
A new piece of ransomware targeting Apple users emerges along with a hybrid malware combining Zeus and Carberp. There’s also an issue with the Spotify Android app.
Something very weird is going on with the popular free whole-disk encryption suite TrueCrypt. The story is still developing, but it does look like the suite ceases to exist right
Kaspersky Lab has launched new a Cyberstat portal, which shows how vast the present day cyberworld is and how quickly it expands.
New ransomware targets Apple users running iOS mobile and O SX Mac devices with a piece of malware that blocks use and demands payments.
In recent years, payment and banking services have been drawing closer attention of all sorts of criminals. The number of crimes related to stealing money via electronic communications keeps growing.
Windows Phones continue to grow in popularity, which means users should take precautions to make their devices as secure as possible.
Device loss remains among the most serious cyber-threats to consumers. Here are a few tips to avoid losing your favorite gadgets.
It’s ridiculously simple to lose your money because of credit card fraud. Secure yourself in all stages―from choosing your card to paying overseas ―using our simple guide.
Last week, Kaspersky Lab hosted a webinar to discuss the threat landscape in the era of targeted attacks. Here’s a summary and slides from this event.
Habits are easy to form and hard to break in all facets of life, including technology usage. Sometimes a user’s habits may not seem so harmful, at least from their
So, you may have heard that antivirus has been pronounced dead – again. It has happened before and, no doubt, will happen again. Usually, such “big” announcements are used when
OpenID and OAuth are protocols responsible for those “Login with Facebook” and “Authorize with Google” buttons you see on almost every site nowadays. Of course, there is a hack for that™, but you don’t need neither panic nor change your password. Read on for our simple action plan.
Kaspersky Internet Security for Android identified and neutralized 100 percent of the malware programs; the average score of the other solutions tested was a 95-percent success rate.
Top Apps to protect you from prying eyes, mischievous kids, thieves, natural disasters, forgetfulness and of course malware.
The virtual environment requires the same protection as physical PCs, but the approach should be different. Full blown security solutions on every virtual machine? The strain for a physical server would be too great. But here comes ‘Light-Agent’…
Get rid of old gadgets while keeping your data secure and private.
Last week, we had a look at private messengers; today, we decided to compile a list of good apps to protect you, your iPhone and its content.
Peter Beardmore, Director of Product Marketing with Kaspersky Lab, shares his opinion on the major advantages which promotes Kaspersky Lab’s enterprise security solutions ahead of competing products.