Cyberfun with flags
Twice a year, we ask people from all over the world about a variety of things, all having to do with one huge topic: the Internet. We process all of
239 articles
Twice a year, we ask people from all over the world about a variety of things, all having to do with one huge topic: the Internet. We process all of
For a great majority of parents, it’s quite reasonable to worry that kids will come across inappropriate websites — or worse — while they’re playing or browsing on an iPhone
1. Make backups on a regular basis. 2. Make backups on a regular basis. 3. Make backups on a regular basis. 4. Make backups on a regular basis. 5. Make
It’s true not much malware exists in the wild for MacOS or iOS. But there is some — and phishing sites, spammers, and carders don’t discriminate on the basis of
Modern smartphones have way more memory than desktop computers had a decade ago. Out of space? Why bother deleting anything when you can just replace your old 64GB memory card
Back in 2015, a 47-year-old man from the Netherlands became one of the first people to be diagnosed with “digital hoarding disorder.” The man took thousands of digital pictures daily and
Main Findings The rapid growth in the use of applications has significantly added to the digital clutter that exists on people’s digital devices: for example, users typically install 12 Android
Password management is one of the most essential and yet probably the most annoying of security measures. Short passwords are easy to remember, but they’re insecure; long and strong passwords
We don’t usually spend a lot of time choosing a hot dog: a quick look, a quick sniff, a look around the vendor’s stand. Some might check the seller’s permits,
As a tradition, at the end of the year our GReAT cybersecurity experts publish their predictions for the upcoming year. Let’s see which of last year’s predictions came true and then try
It’s the most wonderful time of the year — families gearing up for the holiday season, bright-eyed shoppers making their lists and checking them twice…cybercriminals licking their chops and picking
This post is intended for people who either never heard of ransomware or knew about it but didn’t really pay attention. We will explain in practical, down-to-earth language what ransomware
You’ve probably heard the word botnet more than once recently, and that’s hardly surprising. Any connected device can be zombified — turned into a part of a botnet. These include
Ransomware has probably earned more posts on the Kaspersky Daily Blog than any other type of threat. Frankly, we’ve posted so many articles, pieces of advice, tips, and tricks, that
Kaspersky Lab not only develops security solutions but also helps to catch criminals and creates free decryption tools for ransomware victims. The utilities can be downloaded from the No More
Here on Kaspersky Daily, you can find four detailed articles that explain what exactly a virtual private network (VPN) is and why people use VPNs, describe the different ways to
With lots of the things you buy, it’s easy enough to make an informed decision: read up on car specs, check a banana’s ripeness, try on a jacket. With security
Fall is update season, at least in the high-tech world. We introduced our new product familyrecently, and Microsoft issued a critical update for Windows 10, aka Redstone 1 or Anniversary
Humanity is steadily getting older, which, in turn, increases the number of elderly people online. Today, almost almost 18% of Facebook users are 55 or older. We set out to
Security solutions must be able to perform two big functions: prevention and, if necessary, remediation. Kaspersky Lab’s latest patent is a technology that makes both more effective. The most common
Picture a hacker. What does he look like? Nerdy? Lives with his mom? Wears a black hoodie? Lives on pizza? Types on three computers simultaneously… constantly? OK, we’re out of