
Tizen OS: 40 new vulnerabilities
For several years the biggest smartphone developer, Samsung, has been heavily promoting the Tizen operating system. This experiment began in 2013, when the market saw two new Samsung cameras that
3347 articles
For several years the biggest smartphone developer, Samsung, has been heavily promoting the Tizen operating system. This experiment began in 2013, when the market saw two new Samsung cameras that
You might’ve noticed that we are fond of theft by ATM. No, we don’t hack them ourselves, but whenever someone else does, we jump right on the case. At SAS
One soldier does not make a battle, especially in the world of cybercrime, where hidden dangers lurk in the depths of the darknet and occasionally appear topside. There are a
When you are a serious IT company, life is freaking hard, especially on April 1. You are expected to follow the tradition — take some lame idea, cover it as
At this time of year, the number of tax scams reaches a peak, with fraudsters looking for any chance to cash in on consumers, the self-employed, and small businesses that
1. Make backups on a regular basis. 2. Make backups on a regular basis. 3. Make backups on a regular basis. 4. Make backups on a regular basis. 5. Make
1. What is a VPN? From Wikipedia’s current definition: “A virtual private network (VPN) is a virtualized extension of a private network across a public network such as the Internet.”
Virtual goods are becoming more and more popular with cybercriminals, who are aiming more and more scams at gamers. Crooks have taken a renewed shine to World of Warcraft, as
It’s true not much malware exists in the wild for MacOS or iOS. But there is some — and phishing sites, spammers, and carders don’t discriminate on the basis of
A long time ago, in the prehistoric digital era, in a world of big trees while we were a mere bonsai, we started throwing a yearly conference for a select
Today we are going to talk about My Kaspersky. This Web portal lets users manage our security solutions on all of their devices remotely. A brief historical note: My Kaspersky grew
Update: The app described in this post is discontinued. Kaspersky Internet Security and Kaspersky Total Security users are familiar with Anti-Banner, a handy component that blocks annoying ads on websites and in
We’ve already posted about Eugene Kaspersky and about a hundred other people being on their way to the Antarctic. Well, neither Eugene nor his travel companions do such things on a
Modern smartphones have way more memory than desktop computers had a decade ago. Out of space? Why bother deleting anything when you can just replace your old 64GB memory card
Back in 2015, a 47-year-old man from the Netherlands became one of the first people to be diagnosed with “digital hoarding disorder.” The man took thousands of digital pictures daily and
Main Findings The rapid growth in the use of applications has significantly added to the digital clutter that exists on people’s digital devices: for example, users typically install 12 Android
Calling Captain Obvious…come in, Captain Obvious: Which IT threat brings the most danger to enterprises, SMBs, governments, and individuals? The answer, of course, is data breaches. Now: Which data breaches are
Password management is one of the most essential and yet probably the most annoying of security measures. Short passwords are easy to remember, but they’re insecure; long and strong passwords
It’s the small things in life — delicious tea in your favorite mug, comfortable shoes, a flower on the window seat, and … the Kaspersky Protection browser extension. We’ve already discussed its
About a year ago, a number of people, truly passionate enthusiasts and straight-up frauds alike, started manically preaching the coming of the Blockchain Almighty. It will change the world forever,
We’ve written about insecure fingerprint sensors and other biometric technologies a lot. We were not alone, of course. It looks like the fuss did some good. At Mobile World Congress