Beware of Webcams!
Attackers trying to infect your computer with malware capable of remote access don’t necessarily seek money; some cybercriminals are just having fun. The most valuable items to these invaders are
454 articles
Attackers trying to infect your computer with malware capable of remote access don’t necessarily seek money; some cybercriminals are just having fun. The most valuable items to these invaders are
Whenever you read a news headline about the arrest or conviction of a cybercriminal, you can guarantee that the bulk of the investigative work was done by the work of
While people remain really willing to share details of their lives via social media platforms such as Facebook, Twitter and Google Plus, the chief privacy officers at those companies say
Pop-up ads aren’t the massive problem they once were, but they’re still a nuisance. And because most reputable sites now steer clear of them, a lot of the pop-ups that
The official Day of Love has arrived, so many of us will receive traditional anonymous Valentines – most of them in electronic form nowadays. Usually it doesn’t take a genius
Stefan Tanase, Kaspersky Lab’s Senior Security Researcher, Global Research & Analysis Team, answers users’ questions about social networks, malware and everything in between. There is a saying: “information is power”
You probably hadn’t even thrown away the wrapping paper and upgraded from pajamas to pants before you were knee-deep in your new computer (probably a laptop of one brand or
The good old days, when the owners of mobile phones and smartphones had little to fear from malicious programs and could keep all their personal info in their devices’ memory,
In a three-month period this year, Kaspersky Lab products detected and prevented nearly 1.5 billion attempts to infect users’ computers. These included attacks on mobile devices and malware targeting Mac
Apple popularized the app-store concept and the iPhone and its companion store have gained a reputation for security over the years. While iOS on its own is quite secure, there
Google’s Android operating system far and away dominates the mobile market with more than 68 percent of devices running the open source OS, according to research firm IDC. Whilst this
Hackers spent much of 2012 laying the groundwork for what they have in store for not only big business and strategic government and military targets, but consumers as well in
If you’ve used the Internet for more than seven minutes, you’ve probably been targeted by several hundred phishing attacks. Phishing, when attackers try to pry bank account numbers, codes and