Five Tips how to stop your pesky neighbors from pirating your WiFi signal
Wireless Internet access has to go down as one of the handful of best technological advances in the last 10 years. It’s hard to even remember what it was like
3294 articles
Wireless Internet access has to go down as one of the handful of best technological advances in the last 10 years. It’s hard to even remember what it was like
The phrase targeted attack looks to be redundant at first glance. Of course an attack is targeted. What good would it be without a target? But the reality is that
There’s no two ways about it, cybercrime is big business. Accurate estimates are hard to come by, but you can safely assume it’s well into the billions of dollars. Likely
Eugene Kaspersky has had an interesting, varied life, with more than his share of adventures, successes and challenges. He’s seen and done a lot, but when he learned that he
The next version of Internet Explorer, IE 10, is designed by default to prevent your online activity from being tracked by would-be advertisers. But that may not stop advertisers from
If you use Google Chrome as your web browser and you hate Facebook’s new Timeline layout, attackers are looking for you. Lots of people have griped about Timeline since Facebook
If you’re a regular DropBox user, you may have noticed that your inbox has been full of spam this summer. Well, DropBox noticed it too (they had it pointed out
As the use of Smartphones continues to grow in the U.S., the majority of users are very sensitive about how much personal information they have to share when downloading apps
Yes, this is the most secure version of the Windows Store ever. Sure, it’s also the first version of the Windows Store, but Microsoft knows that the basic mechanics of
PROS Awesome design First of all, the Metro interface looks amazing. It is very light, clean and simple. The user experience is a result of the developer’s abilities to follow
A bug in the iPhone means that users shouldn’t necessarily trust that text messages they receive are coming from the phone numbers they claim to be sent from. According to
As you already know, Windows 8 has some major differences from Windows 7. In order to provide the best and most secure user experience, we created KIS2013 and KAV2013 modified
Hacking someone’s personal email account is the best way to control their online presence, and new research shows that it is frighteningly easy to do just that. A recent study
Ryan Naraine interviews Kaspersky Lab Chief Technology Officer, Nikolay Grebennikov about malicious threats on mobile devices. Grebennikov talks about the taxonomy of threats and explains Kaspersky lab’s vision for protecting
In today’s world, we’re all carrying multiple digital devices that require protection from cybercrime. Kaspersky ONE makes it easier than ever. With just one license, you can conveniently secure any
It’s no longer just your PC that needs protection. These days your information lives on multiple devices – your smartphone, your tablet, even your Mac – & you want to
When it comes to online security, you need to be completely protected. You need hybrid protection, the combined power of the cloud and your PC. As great as cloud security