How to Avoid Gadget Loss
Device loss remains among the most serious cyber-threats to consumers. Here are a few tips to avoid losing your favorite gadgets.
698 articles
Device loss remains among the most serious cyber-threats to consumers. Here are a few tips to avoid losing your favorite gadgets.
Last week, Kaspersky Lab hosted a webinar to discuss the threat landscape in the era of targeted attacks. Here’s a summary and slides from this event.
Hack your way through the smart city of the future in the upcoming Watch_Dogs game. Reality checked by Kaspersky.
Whether you’re a victim or a witness, there are a number of sources you can submit online threat information to in order to make the Internet a safer place.
OpenID and OAuth are protocols responsible for those “Login with Facebook” and “Authorize with Google” buttons you see on almost every site nowadays. Of course, there is a hack for that™, but you don’t need neither panic nor change your password. Read on for our simple action plan.
Microsoft Internet Explorer and Adobe Flash Player zero-days replace OpenSSL Heartbleed as the primary topic of discussion in this week’s security news.
April brought with it some of the biggest security news any of us have seen in quite some time. If you missed any of our coverage or any of our posts from the month, it’s time to catch up now!
Top Apps to protect you from prying eyes, mischievous kids, thieves, natural disasters, forgetfulness and of course malware.
Have sensitive contacts to hide? There is a way to conveniently hide them on your smartphone.
In this video tutorial, we explore the Facebook settings pages, explaining what each feature does and showing users how to securely configure their profiles
Frequently asked questions about Kaspersky Internet Security for Android are answered!
The first quarter of 2014 has passed, so Kaspersky Lab’s researchers have released their quarterly report on IT threat evolution for the first three months of 2014. It’s quite an
Today, regular instant messengers are hard to trust when it comes to privacy. There are, of course, safer alternatives, but are they able to substitute Skype and WhatsApp?
Cryptographic hash functions are a ubiquitous tool in computing, used for everything from identity verification to malware detection to file protection.
As reported yesterday, security researchers have found a nasty bug in OpenSSL, which allows reading the memory of systems protected by the vulnerable versions of the OpenSSL software. This effectively
A very serious flaw has just been discovered in OpenSSL – an open-source and very popular cryptographic library, which has already incited a minor (for now) panic amongst security experts.
In the news this month: more transparency reports, Microsoft zero days, data breaches, and NSA revelations. WhatsApp – the popular global messaging service – is acquired by Facebook, much to
Last week was something of a slow week for those of us that spend our days writing about computer security news. However, while there may not have been an abundance
Last week brought us a host of news stories, including a handful of highlights. As usual, we have collected the most interesting security news and are bringing it to you
Even though February is the shortest month of the year, we still have plenty of top stories to share with you, keeping you in the know when it comes to