How Scary Can An Old-School Programmer Be?
Recently Eugene Kaspersky wrote in his blog a post about the so called Big Comeback of old-school virus writers. I am old enough to remember those guys and their brilliant
3893 articles
Recently Eugene Kaspersky wrote in his blog a post about the so called Big Comeback of old-school virus writers. I am old enough to remember those guys and their brilliant
User friendliness and ease of use are up there with reliable protection when deciding on IT security solutions. One might think that these two requirements are incompatible – a complex
While people remain really willing to share details of their lives via social media platforms such as Facebook, Twitter and Google Plus, the chief privacy officers at those companies say
The number of those affected by identity theft is on the rise again according to recent research. A quarter of consumers that received data breach letters last year wound up
Protect your smartphone not just from malware but phishing sites and prying eyes. You also need to be able to secure your data if your phone’s lost or stolen! Check
The overwhelming majority of businesses today are encouraging employees to adopt “mobile” working practices, meaning that work can be done wherever, whenever and from whatever device – smartphone, tablet or
RSA is like the Hogwarts of Security, the annual reunion for cyber jedi masters or the secret fight club for private security companies, governmental agencies and international organizations. We’ve got
RSA is the major event in security. Basically it’s like the Big 8 International Conference or, better yet – the Olympics of security – except nobody is throwing spears and
The Mobile World Congress, which is currently under way in Barcelona, is the world’s premier telecoms industry event. It’s the place where the most important announcements are made on issues
The energetic Olga Rumyantseva heads for the second volcano out of the seven that she plans to climb on her own over this year. We asked Olga to tell us
Three young researchers have made their mark on the cybersecurity world and will now present their work at the final of the ‘CyberSecurity for the Next Generation’ student conference in
WordPress has become one of the more popular web platforms, both for personal and professional websites, because it is simple to use and yet very flexible. But this popularity also
Social networks have become major targets for attackers, who value the implied trust that users have in their friends’ accounts. Compromising a large number of accounts on one of the
Facebook recently announced the return of facial recognition for photos, and as tends to happen whenever the company announces new features for its site, privacy advocates are wary of this
Young researchers, original security projects, making contacts among your peers, and a stepping-stone into the professional community – these are the key ingredients of Kaspersky Academy’s ‘CyberSecurity for the Next
Due to a lack of malicious activity targeting Mac OS X it has been considered a relatively safe operating system for some time now. But times change, and that complacency
Today’s teens live in a world in which much of their lives — scholastic, social and otherwise — take place online. This puts parents in the difficult position of wanting
Home PCs and laptops remain an important place for storing sensitive information, including personal emails, logins and passwords, photos, financial data and more. Of course, this information needs to be
Pop-up ads aren’t the massive problem they once were, but they’re still a nuisance. And because most reputable sites now steer clear of them, a lot of the pop-ups that
One woman’s epic quest to conquer the world’s tallest volcanoes could be the key to you winning an unforgettable getaway for two. Renowned mountaineer Olga Rumyantseva is pursuing her dream
Say you’re in a public space and you want to use your laptop to go online but there’s no WiFi available. Well, if you have your mobile device, you may