
My Precious Data: Digital clutter and its dangers
Main Findings The rapid growth in the use of applications has significantly added to the digital clutter that exists on people’s digital devices: for example, users typically install 12 Android
3332 articles
Main Findings The rapid growth in the use of applications has significantly added to the digital clutter that exists on people’s digital devices: for example, users typically install 12 Android
Calling Captain Obvious…come in, Captain Obvious: Which IT threat brings the most danger to enterprises, SMBs, governments, and individuals? The answer, of course, is data breaches. Now: Which data breaches are
Password management is one of the most essential and yet probably the most annoying of security measures. Short passwords are easy to remember, but they’re insecure; long and strong passwords
It’s the small things in life — delicious tea in your favorite mug, comfortable shoes, a flower on the window seat, and … the Kaspersky Protection browser extension. We’ve already discussed its
About a year ago, a number of people, truly passionate enthusiasts and straight-up frauds alike, started manically preaching the coming of the Blockchain Almighty. It will change the world forever,
We’ve written about insecure fingerprint sensors and other biometric technologies a lot. We were not alone, of course. It looks like the fuss did some good. At Mobile World Congress
We love cybersecurity and find it fascinating. Cybercriminals invent new ways to attack victims daily, and we counter them with tools to protect people. It’s a game of cat-and-mouse, but
Who among us has never tried to imagine what future lies ahead? The average citizen might think a month or a year ahead, but futurologists try to forecast the destiny
Nowadays the proverb “the walls have ears” is not as metaphoric as it used to be. “The telescreen received and transmitted simultaneously. Any sound that Winston made, above the level
Recent news about IP cameras being hacked and private footage sold unlawfully online has bestirred the Internet yet again. Such headlines are now unsurprising; however, one new case has a sensitive twist:
Last week, a coworker shared an interesting article with me from the BBC. It reported that Germans were being told to destroy a connected children’s toy because of hacking concerns.
And now, boys and girls, woo-hoo! Today is a day when woo-hoo’ing seems the most appropriate thing to do. Like this: WOO-HOO!!! Why, you say? We’ve officially launched our very
In the movie Dude, Where’s My Car? (2000), viewers follow the humorous tale of two guys who partied a bit too hard trying to remember where they parked their car. We’ve all
No one expects ransomware — until it happens. If you think it’ll never hit you, consider this: According to Kaspersky Lab data, last year ransomware hit a new victim every
We keep talking (and talking, and talking) about passwords. Having strong passwords for all accounts is really a must: Our recent study shows that one in five users has experienced attempts to hack their accounts —
The annual RSA conference will often overwhelm the average attendee. Between the great talks, the exhibition hall, the parties, and the city of San Francisco itself, there is a whole
In the face of malware, Android has a very good defense mechanism — the app permissions system. This system defines a set of actions an app is allowed (or not
One day in May 2016, Marion, a computer user from Germany, logged on to her home computer. She had no idea what lay in store for her. The first sign
Every gamer knows what Steam is and more than likely uses it. Steam accounts are also bought and sold for real money, which makes them very attractive to cybercriminals. We’ve already
Recently Robert O’Callahan, who used to be a Firefox developer, published a provocative opinion stating that people should delete their antivirus protection because the basic security that operating systems provide is sufficient.