
How to Open Unknown Attachments
When handling new or complicated attachment types from unknown senders, it is wise to always scan the downloaded attachment with an antivirus system.
3931 articles
When handling new or complicated attachment types from unknown senders, it is wise to always scan the downloaded attachment with an antivirus system.
Device loss remains among the most serious cyber-threats to consumers. Here are a few tips to avoid losing your favorite gadgets.
What Facebook habits make you vulnerable and how to avoid them.
Bitly was compromised this week and is urging users to change passwords. Point-of-sale systems are poorly secured. And fixes from Microsoft on Patch Tuesday.
Many Internet-connected smart home systems contain vulnerabilities that could expose the owners of those systems to physical and digital theft.
It’s ridiculously simple to lose your money because of credit card fraud. Secure yourself in all stages―from choosing your card to paying overseas ―using our simple guide.
Last week, Kaspersky Lab hosted a webinar to discuss the threat landscape in the era of targeted attacks. Here’s a summary and slides from this event.
But while Android’s market figures continue to pile up, so do the knocks against the company’s security protocols.
Prevent kids from visiting the wrong sites or installing unwanted apps on your smartphone – use the safety features of Kaspersky Internet Security for Android.
We continue our overview of the Kaspersky Security Center functionality and Software Assistant technologies in particular.
A new piece of ransomware is targeting Android users and may be related to the infamous CryptoLocker malware.
IT workers sometimes have to manage several dozen or even several hundred PCs at once, which makes an automated management solution absolutely necessary. Kaspersky Security Center’s Software Assistant makes accomplishing routine IT tasks extremely easy.
Hack your way through the smart city of the future in the upcoming Watch_Dogs game. Reality checked by Kaspersky.
Habits are easy to form and hard to break in all facets of life, including technology usage. Sometimes a user’s habits may not seem so harmful, at least from their
So, you may have heard that antivirus has been pronounced dead – again. It has happened before and, no doubt, will happen again. Usually, such “big” announcements are used when
Whether you’re a victim or a witness, there are a number of sources you can submit online threat information to in order to make the Internet a safer place.
Microsoft had to deal with a new less-than-pleasant vulnerability in Internet Explorer browser, which affected all of its versions starting with IE6 in all of its operational systems including the
The criminals continue their bad business, and law enforcement agencies successfully chase them down. It happens every month, so here are the most interesting cases from April.
OpenID and OAuth are protocols responsible for those “Login with Facebook” and “Authorize with Google” buttons you see on almost every site nowadays. Of course, there is a hack for that™, but you don’t need neither panic nor change your password. Read on for our simple action plan.
Microsoft Internet Explorer and Adobe Flash Player zero-days replace OpenSSL Heartbleed as the primary topic of discussion in this week’s security news.