
October Monthly Roundup
It’s that time of month again when we catch you up on anything you may have missed in October. So take a peek at some of our top posts from
750 articles
It’s that time of month again when we catch you up on anything you may have missed in October. So take a peek at some of our top posts from
Malicious websites pose a serious danger to iOS users and Kaspersky Lab is aiming to protect them with its new Safe Browser. Many Apple users consider themselves safe because of
Banking trojans are like rats, you kick a trashcan and six of them go scurrying off in every direction. Most of them you’ll read about once and never again. But
It is well established that the rapid proliferation of mobile devices has presented a number of unique security concerns – especially given the increasingly blurry line separating personal devices and
Nowadays, quantum systems really do exist, with some of them reaching the stage of commercial sales. Quantum computers raise and answer new questions in the security field.
With 125,000 new malicious programs appearing every single day — antivirus protection is a necessity, not a luxury. Your PC needs effective antivirus defense and you deserve an antivirus solution
What kind of corporate network would be considered secure? Primarily one that is controlled by its operators, or in other words, a network in which the system administrator knows where,
Today’s malware is definitely not the only security threat for individual and corporate users, but the tools of detecting and fighting malware remain fundamental in any security solution. There are
Apple Developer Center down for a week It took Apple about a week to restore the functions of the Apple Developer Center following its crash on July 18. After about
According to the cloud-based Kaspersky Security Network, about 200,000 new malware samples emerge every day, compared to 125,000 just a year ago. The price of poor-quality protection against cyber threats
Today is National Senior Citizens Day, and what better way to recognize all that seniors have done and still are doing than by helping them be more productive and healthy
Everyday millions of computers solve the same problem; these machines try to check if you are actually you and not some other person. The most popular tool to do that
The rapid development of the smartphone and tablet market has gone hand-in-hand with an alarming growth in the number and variety of threats targeting these devices. We have a single
Myths and prejudices are inevitable companions to any branch of knowledge, and the information security sphere is no exception, no matter how practical it is. This article will briefly touch
The popular microblogging website, Tumblr, announced a breach in its security for iOS customers last week. The company asked all users of its iPhone and iPad app to change their
For a very long time, Apple and its pseudo-religious user-base prided itself on being a platform free of malware; those days are inarguably and unequivocally over. Its emergence as the
In addition to the above examples, there were two other large scale and highly scandalous invasions in July and August of last year. The victims were users of the popular
A little over a year ago, most of us woke up one day and discovered that Google Docs was gone, replaced by this weird new thing called Google Drive. Then
If computers themselves are relatively new in the grand scheme of things, then mobile devices are incredibly new. And likewise, just as we’ve spent the better part of the last
The ancient stratovolcano, Elbrus, is Europe’s highest peak and takes its place amongst the “Seven Summits,” a must for any self-respecting mountaineer. So naturally Olga Rumyantseva could not pass it
There is a common belief that Apple operating systems are well protected against cybercriminals. This belief used to be true, but Apple users are quickly becoming an attractive target for