
iOS 7 Premieres Some Nifty New Security Features
There’s been something of an uneasy consensus among experts that Apple’s iOS platform is the most secure option among mobile operating systems almost exclusively because of the closed-off nature of
654 articles
There’s been something of an uneasy consensus among experts that Apple’s iOS platform is the most secure option among mobile operating systems almost exclusively because of the closed-off nature of
A group of Internet activists and privacy advocates penned an open letter to Microsoft earlier this year urging the company to shed light on just how confidential the conversations are
The threats facing mobile devices are among the fastest growing and most serious dangers to the digital world. We gathered your questions on the subject and passed them on to
Mobile threats are the new kids on the malware block – with the first viruses for mobile devices emerging as recently as 2004. However, over the last two years this
Updated: January 30, 2015 These now-familiar square images you see in ads, magazines and posters have proved to be the easiest and cheapest way to link the real and the
It’s that time of year when, in the afterglow of the holiday season we start to play with all of our new toys. For a lot of people that will
The last year has seen a lot of changes in the threat landscape, with the emergence of a number of new cyber espionage tools such as Gauss and Flame, as
The good old days, when the owners of mobile phones and smartphones had little to fear from malicious programs and could keep all their personal info in their devices’ memory,
Android devices are the most prevalent smartphones on the market, and the most maligned. Hackers had a banner year in 2012 targeting the mobile platform with a variety of malware
Google’s Android operating system far and away dominates the mobile market with more than 68 percent of devices running the open source OS, according to research firm IDC. Whilst this
One of the little compromises that we’ve all had to make to get the advantages of mobile apps is the blind acceptance of the terms of service for the app
Hi, folks! For the last two weeks each and every fan of official Kaspersky Lab Facebook pages worldwide had the chance to ask our CEO, Eugene Kaspersky, anything at all
A comprehensive guide to configuring privacy and security in ChatGPT: data collection and usage, memory, Temporary Chats, connectors, and account security.
How AI-generated code is changing cybersecurity — and what developers and “vibe coders” should expect.
A close look at attacks on LLMs: from ChatGPT and Claude to Copilot and other AI-assistants that power popular apps.
A race between tech giants is unfolding before our very eyes. Who’ll be the first to transform the browser into an AI assistant app? As you test these new products, be sure to consider their enormous impact on security and privacy.
The internet never forgets — and what kids post or share today can come back to hurt them, either right away or years down the line. Here’s how to shrink your child’s digital footprint without resorting to battles or bans.
How 5G smartphone connectivity can be compromised, and what it means for subscribers.
We explain how cyberattackers intercept cookies, the role of the session ID, and how to keep your cookies from going over to the dark side.
Thousands of companies exist for one purpose only: to collect and resell information about each of us. How do they do it, how can you limit data collection, and how do you delete what’s already been collected?
Everything you need to know about the latest Telegram scams and phishing, and how to stay safe.