If only the Internet starred in sci-fi movies
Blockbusters, like Star Wars or Independence Day, tell us breathtaking stories in which space blasters, force fields and traveling faster than the speed of light are all commonplace. But there
1433 articles
Blockbusters, like Star Wars or Independence Day, tell us breathtaking stories in which space blasters, force fields and traveling faster than the speed of light are all commonplace. But there
Kaspersky Labs security products have taken home multiple awards from independent testing groups in recent weeks, and that trend continued with the announcement that its Android smartphone solution, Kaspersky Mobile
Afraid you missed out on some of our blog posts this June? Not to worry, we’ve compiled highlights from our most popular Kaspersky Daily articles for you! Take a look:
Extortion, blackmail and ransom requests have always been cornerstones of criminal activity. In today’s global internet economy, criminals are adapting their techniques by attempting to extort money from people using
We’re continuing to watch how law enforcement agencies around the world are progressing in the fight against cybercrime. They’ve been able to keep jailing hackers, both for minor cybercrimes like
14 finalists, 10 countries, 5 regional heats: and one London Final. We are still flying high from all the excitement generated by the ideas, innovation and inspiration that underpinned the
Have you ever wondered what a hacked computer, email address, or other online account is even worth? Sure, it seems pretty obvious that there’d be some serious value in a
There is an entire market of plugins out there designed to keep you safe while surfing the web on your browser of choice. Each one has lots of options; for
The recent incident of personal data being leaked from Facebook’s servers is just one more demonstration that even the best cloud services are not flawless. Therefore, every user should have
A newly discovered vulnerability in a popular browser exposes how photos can be taken of unsuspecting users. Further proof of hackers’ inventiveness appeared last week in the form of a
In late 2011, it emerged that Chinese hackers had thoroughly compromised the United States Chamber of Commerce, perforating the lobbying-group’s networks with a devastating chain of backdoors. Chamber officials admitted
It’s harder and harder to keep your personal information private when browsing the web, but fortunately there is an entire market of add-on utilities, known as plugins, designed to keep
Monaco is a symbol of the high life. Spend some time in Monte-Carlo and you will see why it is a respected home for the richest people in the world
There’s been something of an uneasy consensus among experts that Apple’s iOS platform is the most secure option among mobile operating systems almost exclusively because of the closed-off nature of
Father’s Day is fast approaching, which means finding the perfect gift for dad should be at the top of your to do list. And if you’ve had your eye on
It’s one thing for an Internet protection suite to claim it has first-class levels of protection, but it is quite another thing when a security platform is found by independent
Another day, another online service adds two-factor authentication to its list of features. This time it was Evernote, the cloud-based note-taking service that hackers managed to compromise and use as
An agenda-packed conference with bright minds and eager speakers paired with an equally excited audience set the stage for Kaspersky Lab’s first annual Cybersecurity Government Forum in Washington, D.C. on
In case you weren’t following us during May, here is a list of the most popular articles that were published on Kaspersky Daily last month. Beware of Snapchat The wildly
We recently wrote about the conspicuous lack of privacy discussion at Google’s recent I/O Conference in San Francisco. While it’s true that there wasn’t much talk of privacy at the
The owners of smartphones running Android and iOS sometimes enter into heated discussions as to whether it’s worthwhile to perform the mysterious procedures known as rooting and jailbreaking their devices.