Spring Clean Your PC
It’s that time of year again: when you put away your winter clothes, realize you haven’t gone to the gym nearly enough to be ready for swimsuit season — and
1402 articles
It’s that time of year again: when you put away your winter clothes, realize you haven’t gone to the gym nearly enough to be ready for swimsuit season — and
Confusion ensued last week after a well-known security researcher identified a number of incredibly troubling security vulnerabilities in a popular Linksys router developed by Cisco Systems. The networking giant almost
As with any new version of the Windows operating system, Microsoft has not only beefed up the feature set you get with your Windows 8 computer, but also the security.
Kaspersky Lab experts have discovered a new trojan virus attacking skype users. Find out how to recognize it before you fall victim.
We all want the newest and best of everything. That’s why every time the latest device comes out we rush to upgrade our suddenly outdated version. Less than 6 percent
Kaspersky Internet Security’s secure keyboard activates automatically when using bank or payment websites and every time you enter a password on any website. Keep your passwords and financial data safe.
Just a few years ago, it was rare to find someone who had more than one or maybe two Internet-connected devices in their home. Now, you’d have to look high
Everyone should know by now that there are, sadly, no members of deposed African royal families who want to share millions of dollars with you, no strings attached. What everyone
The good news for Apple fans is that the Cupertino technology giant issued a serious security upgrade yesterday by adding two-factor authentication to its users’ Apple ID accounts. The bad
Rootkits have been around for nearly 20 years now, allowing attackers to get access to and steal data from users’ machines without being detected for long periods of time. The
The threats facing mobile devices are among the fastest growing and most serious dangers to the digital world. We gathered your questions on the subject and passed them on to
Isolation is a key concept in information security. For example, computers critical to services such as electric utilities or financial systems are often kept isolated, or air-gapped, from the Internet.
Attackers trying to infect your computer with malware capable of remote access don’t necessarily seek money; some cybercriminals are just having fun. The most valuable items to these invaders are
Crime in the virtual world has long been a tough nut to crack for law enforcement agencies and the courts. Getting to the bottom of a cyberattack and then gathering
Creating backup copies is one of the most reliable methods of safeguarding important data: whatever happens to your valuable files, you will always have a copy at hand. This is
User friendliness and ease of use are up there with reliable protection when deciding on IT security solutions. One might think that these two requirements are incompatible – a complex
The number of those affected by identity theft is on the rise again according to recent research. A quarter of consumers that received data breach letters last year wound up
The overwhelming majority of businesses today are encouraging employees to adopt “mobile” working practices, meaning that work can be done wherever, whenever and from whatever device – smartphone, tablet or
RSA is the major event in security. Basically it’s like the Big 8 International Conference or, better yet – the Olympics of security – except nobody is throwing spears and
WordPress has become one of the more popular web platforms, both for personal and professional websites, because it is simple to use and yet very flexible. But this popularity also
Social networks have become major targets for attackers, who value the implied trust that users have in their friends’ accounts. Compromising a large number of accounts on one of the