Posting photos of your debit card… is a terrible idea
This really shouldn’t need to be said, but here goes: You should never, ever – under any circumstances – post a picture of your debit or credit card anywhere online.
580 articles
This really shouldn’t need to be said, but here goes: You should never, ever – under any circumstances – post a picture of your debit or credit card anywhere online.
The last year has seen a lot of changes in the threat landscape, with the emergence of a number of new cyber espionage tools such as Gauss and Flame, as
Cybercrime is a funny business. The common element in cybercrime operations is that attackers enjoy virtual anonymity and a low chance of detections. And like most kinds of thievery, it
Making a good password is more important than ever and with as many sensitive accounts – email, credit cards, shared documents – as we have online today there’s simply no
One of the little compromises that we’ve all had to make to get the advantages of mobile apps is the blind acceptance of the terms of service for the app
One of the many problems inherent in social networks such as Twitter, Facebook and LinkedIn is the issue of authentication. People want to connect with their friends and colleagues, but
Scareware is the catch-all name used for any of the numerous programs that weasel their way into computers and then pepper users with frightening pop-ups telling them their systems have
Hi, folks! For the last two weeks each and every fan of official Kaspersky Lab Facebook pages worldwide had the chance to ask our CEO, Eugene Kaspersky, anything at all
The pervasiveness of public WiFi has reached a point now that it’s become difficult to avoid. You actually have to go out of your way to NOT use public hotspots,
If you’ve used the Internet for more than seven minutes, you’ve probably been targeted by several hundred phishing attacks. Phishing, when attackers try to pry bank account numbers, codes and
The phrase targeted attack looks to be redundant at first glance. Of course an attack is targeted. What good would it be without a target? But the reality is that
As you already know, Windows 8 has some major differences from Windows 7. In order to provide the best and most secure user experience, we created KIS2013 and KAV2013 modified
Hacking someone’s personal email account is the best way to control their online presence, and new research shows that it is frighteningly easy to do just that. A recent study