Top Cybercriminal Prosecutions Of The Month
Non-stop cat and mouse We all need a vacation or at least a weekend to catch our breath a little and get going again. Only the criminal world works non-stop.
448 articles
Non-stop cat and mouse We all need a vacation or at least a weekend to catch our breath a little and get going again. Only the criminal world works non-stop.
Spam. For most Internet users this word is pretty emotionally colored with irritation and even disgust. Though you might be following our suggested rules, a couple of unwanted emails and
Cybercriminals are constantly looking for new ways to manipulate victims online. One of your strongest lines of defense against having your personal data and your money fall into the hands
Almost everyone knows computers need virus protection. Knowledge about safety and privacy-friendly online behavior is much less widespread, though, and extensive media coverage of Edward Snowden’s leaks regarding U.S. government
Today’s malware is definitely not the only security threat for individual and corporate users, but the tools of detecting and fighting malware remain fundamental in any security solution. There are
You have probably already heard about the security of iOS and how Apple controls its App Store. In fact, they are doing an exceptional job since the release of iOS,
Apple Developer Center down for a week It took Apple about a week to restore the functions of the Apple Developer Center following its crash on July 18. After about
August has come and gone, you’re home from vacation and you’re ready to settle back into your routine. So make sure you’re prepared for the month ahead by catching yourself
Phishing is a dangerous type of Internet fraud that uses fake websites to swipe user logins and passwords to hijack their online accounts to steal money or spread spam and
According to the cloud-based Kaspersky Security Network, about 200,000 new malware samples emerge every day, compared to 125,000 just a year ago. The price of poor-quality protection against cyber threats
It’s no secret to anyone to know that Google keeps every bit of data it collects about each of its users. This data includes, but is not limited to, search
Even if you follow all the Cardinal Rules of system security — you regularly update your operating system and programs, avoid spam like the plague and never click through on suspicious
A lot of families buy computers and devices as kids head back to school, making it the time of year for those comprehensive “101% Protection” anti-virus and Internet security suites
It’s always good to have a real expert answering your questions. We’ve found the best of the best – members of Kaspersky’s Global Research and Analysis Team (GReAT), the research
The rapid development of the smartphone and tablet market has gone hand-in-hand with an alarming growth in the number and variety of threats targeting these devices. We have a single
On the night of June 5, 2013 a coalition led by the FBI and Microsoft broke up a botnet of two million connected PCs that was being used by cybercriminals
If you haven’t heard by now, three days before Jay Z released his most recent album “Magna Carta… Holy Grail” in July, Samsung Galaxy device owners could download it via
There are no borders for cybercriminals. To be more precise, they strategically use borders to steal in one country, cash out in another and spend stolen money in a third
In addition to the above examples, there were two other large scale and highly scandalous invasions in July and August of last year. The victims were users of the popular
According to Kaspersky Labs research, 34 percent of worldwide Internet users were attacked by malicious programs in 2012. As always, the most popular entries for attackers were widely used programs
There is an entire market of plugins out there designed to keep you safe while surfing the web on your browser of choice. Each one has lots of options; for