What you should know getting started with your new Apple iPad
Just took your new iPad out of the box? Here we explain how to make it more secure and easy to use
698 articles
Just took your new iPad out of the box? Here we explain how to make it more secure and easy to use
Your smartphone knows everything about you: whom you call and what messages you send, which websites you visit and what photos you take, including even when and where you do it. This data may be used against you.
Do you know how many companies are actually tracking you when you visit a single website? The answer may surprise you.
We’ve seen drones armed with chainsaws and guns. More alarming though is how easily they can be hacked.
We talk about ever-present connectivity. What does that mean for raising kids?
Aggressive moral crusaders search for porn actresses accounts on VK.com and cyberbully them along with their friends and families.
The Kaspersky Daily team checks if FindFace can really find users on a social media site with one image taken on the street and if it is possible to hide from it. Some interesting peculiarities detected!
How everyone and his dog online make the big data tyranny raise.
VPN’s features and pitfalls from legal and technical standpoint
Google has begun phasing out Chrome support on legacy OS X platforms.
Aleks Gostev of Kaspersky Lab’s GReAT discusses the WhatApp move towards encryption and how email needs to be next in adopting end-to-end encryption
WhatsApp has just adopted the end-to-end encryption based on Signal Protocol. Kaspersky Daily explains, why it’s the good news and what are the real benefits for all of us.
Categories: Featured, News, Security
Like all social media platforms, it’s important to ensure you keep your LinkedIn account secure.
This year is the 120th since the invention of a tin foil hat – simple to produce and very efficient information security tool, preventing those warping and state-altering attacks targeted at our minds.
Today is the first annual Tin Foil Hat Day. What is it?
Big data is amazing for sure, but as any other tech, especially emerging one, it has issues. Let’s take a look what could possibly go wrong with big data implementations.
As we raise kids in the digital age, the rules are constantly changing. Parents need to find the new best practices to rear kids with our connected lives.
2015 proved: it’s possible to hack a connected car remotely. But is it as dangerous as it seems?
Find out how to make sure you’re keeping your Tumblr account as secure as possible.