MWC 2013: Securing Mobile Business
The overwhelming majority of businesses today are encouraging employees to adopt “mobile” working practices, meaning that work can be done wherever, whenever and from whatever device – smartphone, tablet or
“Just because you're paranoid doesn't mean they aren't after you” ― Joseph Heller
272 articles
The overwhelming majority of businesses today are encouraging employees to adopt “mobile” working practices, meaning that work can be done wherever, whenever and from whatever device – smartphone, tablet or
The Mobile World Congress, which is currently under way in Barcelona, is the world’s premier telecoms industry event. It’s the place where the most important announcements are made on issues
The energetic Olga Rumyantseva heads for the second volcano out of the seven that she plans to climb on her own over this year. We asked Olga to tell us
Three young researchers have made their mark on the cybersecurity world and will now present their work at the final of the ‘CyberSecurity for the Next Generation’ student conference in
WordPress has become one of the more popular web platforms, both for personal and professional websites, because it is simple to use and yet very flexible. But this popularity also
Social networks have become major targets for attackers, who value the implied trust that users have in their friends’ accounts. Compromising a large number of accounts on one of the
Facebook recently announced the return of facial recognition for photos, and as tends to happen whenever the company announces new features for its site, privacy advocates are wary of this
Young researchers, original security projects, making contacts among your peers, and a stepping-stone into the professional community – these are the key ingredients of Kaspersky Academy’s ‘CyberSecurity for the Next
Due to a lack of malicious activity targeting Mac OS X it has been considered a relatively safe operating system for some time now. But times change, and that complacency
Today’s teens live in a world in which much of their lives — scholastic, social and otherwise — take place online. This puts parents in the difficult position of wanting
Home PCs and laptops remain an important place for storing sensitive information, including personal emails, logins and passwords, photos, financial data and more. Of course, this information needs to be
Pop-up ads aren’t the massive problem they once were, but they’re still a nuisance. And because most reputable sites now steer clear of them, a lot of the pop-ups that
One woman’s epic quest to conquer the world’s tallest volcanoes could be the key to you winning an unforgettable getaway for two. Renowned mountaineer Olga Rumyantseva is pursuing her dream
Say you’re in a public space and you want to use your laptop to go online but there’s no WiFi available. Well, if you have your mobile device, you may
Meet Max, the IT Security Manager. See how Max, with the help of Kaspersky Lab, tackles the IT security battle in this new animation. Find out how IT security takes
Does Kaspersky write malware or create cyberweapons? Let’s find out! Our undercover reporter tries to trick the Kaspersky team into saying they support cyberwar; but they hate cyberweapons so much
The official Day of Love has arrived, so many of us will receive traditional anonymous Valentines – most of them in electronic form nowadays. Usually it doesn’t take a genius
Massive multiplayer online games — MMOGs — have become hugely popular in recent years, which means, unsurprisingly, that they’ve become big targets for attackers. These games create alternative universes, often
Aside from the endless hours we spend on Gchat at work, online chatting is mostly a kid’s game. But the responsibility falls on adults to know the basics of safe
Updated: January 30, 2015 These now-familiar square images you see in ads, magazines and posters have proved to be the easiest and cheapest way to link the real and the