![Preparing for your child's first gadget: what you need to know](https://media.kasperskydaily.com/wp-content/uploads/sites/92/2023/10/31054843/kids-first-gadget-checklist-featured-700x460.jpg)
Choosing wisely: a guide to your kids’ first gadget
Ready, set, tech: preparing for your kids’ first device.
754 articles
Ready, set, tech: preparing for your kids’ first device.
A detailed checklist on how to prepare for and navigate your child’s first gadget experience.
From watching foreign sports to finding the best online sales, we share the top high-speed VPN lifehacks.
Episode 321 looks at Okta, 1Password, Microsoft AI and Google IP blocking
How and why did American researchers try to extract sound from a video signal, and was it worth it?
What personal information do modern cars collect about you, and how can you avoid surveillance or hacking of your vehicle?
We propose six principles of ethical use of AI in the cybersecurity industry — to be presented at the global Internet Governance Forum.
We explore what Google Ad Topics is, how it functions, and how to disable it. Along the way, we discuss the related topics of Google FLoC, Privacy Sandbox, and the demise of third-party cookies.
How online services should store user passwords, and how to minimize the damage in the event of a leak or hack.
We explain what the Fediverse is, how it works, where you can experience it today, and what to expect in the future.
Comparing user-friendly, secure alternatives to Zoom, Teams and Google Meet calling.
You’re spending way more on subscriptions than you expect. How to take control of them and save money?
Web services and apps are part and parcel of the modern learning process — both online and offline. But they’re often insecure and pose a threat to your child’s personal data. How to stay safe?
The decentralized Mastodon social network claims to be a different breed of social network. Here’s how it works and how to use it without compromising privacy and security.
A new school year, and a familiar headache for parents: kids’ cybersecurity. In this first post, we discuss how to protect your children’s gadgets from cyberthreats.
How URL shorteners work, how they can be used, and the privacy and security threats they pose.
From uncovering cybercriminal tactics to AI hiring tools, HR chatbots, and the UK Electoral Commission’s cyberattack on voter this is Kaspersky Podcast.
What caused a mass vulnerability in VPN clients, and how to keep them working.
Four threats you might face when using Airbnb, and tips for avoiding them.
Here’s how to set up Threads to make your profile both private and secure.
How to secure chats on your phone, and why encryption alone is not enough