How to Fight Rootkits
Security professionals and enthusiasts are aware of rootkits, but general audiences typically don’t know about this kind of malware, which is specifically designed to hide itself and its activity in
448 articles
Security professionals and enthusiasts are aware of rootkits, but general audiences typically don’t know about this kind of malware, which is specifically designed to hide itself and its activity in
The Internet has revolutionized the way we book our holidays. Unfortunately it is also enabling fraudsters to prey upon people’s desires to have a perfect vacation, so stay vigilant and
If Achilles’s heel was his vulnerability in the Iliad, then Paris’s poison tipped arrow was the exploit. Quite literally, an exploit is the device or – more often than not
Not long ago, Twitter was a novelty social media site that average users thought was silly. Now the microblogging tool is a vital news source and publishing platform, letting anyone
Twitter has recently caught up with competitors like Facebook and Google by improving user protection with two-factor authentication. This will help us all forget about those much talked about account
We are continuously watching how law enforcement agencies around the world fight cybercrime. With help from the IT industry and experience gained over the years, these agencies have been able
Over the last 9 years Facebook has grown from a small social networking site originally intended for college students into a worldwide platform that is now used not only by
Given the deftness of malicious hackers, the bar-lowering impact of easily accessible markets for automated cybercriminal kits, and the increasing number of online services and people connected to the Internet,
The general public should be well aware at this point that identity theft is increasingly common and has calamitous effects that are far more serious than the half-baked Melissa McCarthy
Botnets are large networks of PCs infected with a specific kind of malware. Learn more on how to protect your devices from this type of malware.
Smartphones and tablets are now a vital tool for any modern businessman. Many of us cannot imagine life without a mobile assistant which stores our contacts, messages, photos and documents.
A group of Internet activists and privacy advocates penned an open letter to Microsoft earlier this year urging the company to shed light on just how confidential the conversations are
Everyone loves the hands-free convenience that Bluetooth enables — some people love it a little too much and insist on wearing their Bluetooth ear pieces every waking hour like they’re
If a website is compromised by a careful, talented, and well-funded attacker, then the scary reality is that no one will probably ever know that the site had been hacked
The threats facing mobile devices are among the fastest growing and most serious dangers to the digital world. We gathered your questions on the subject and passed them on to
Attackers trying to infect your computer with malware capable of remote access don’t necessarily seek money; some cybercriminals are just having fun. The most valuable items to these invaders are
Whenever you read a news headline about the arrest or conviction of a cybercriminal, you can guarantee that the bulk of the investigative work was done by the work of
While people remain really willing to share details of their lives via social media platforms such as Facebook, Twitter and Google Plus, the chief privacy officers at those companies say
Pop-up ads aren’t the massive problem they once were, but they’re still a nuisance. And because most reputable sites now steer clear of them, a lot of the pop-ups that
The official Day of Love has arrived, so many of us will receive traditional anonymous Valentines – most of them in electronic form nowadays. Usually it doesn’t take a genius
Stefan Tanase, Kaspersky Lab’s Senior Security Researcher, Global Research & Analysis Team, answers users’ questions about social networks, malware and everything in between. There is a saying: “information is power”