Stop iOS location tracking
As you probably know, modern apps often spy on users — at least to the extent of tracking their locations. If your privacy matters to you and you use an
104 articles
As you probably know, modern apps often spy on users — at least to the extent of tracking their locations. If your privacy matters to you and you use an
Now that even coffee machines are Wi-Fi connected, getting to smart sex toys was only a matter of time. People actually started thinking along those lines quite a while ago:
Here is some good news for you. We’ve just launched new the versions of Kaspersky Internet Security and Kaspersky Total Security for Windows! The new product line has become more
You scroll through profiles on a dating site and you see a nice girl who you might like to date. You can send her a message — and she’ll answer
Just getting started with your new iOS device? That’s great, and we don’t want to be a buzzkill, but we strongly urge you do devote some time to adjusting the
As the Olympic Games in Rio draw nearer, cybercriminals are preparing more and more traps for sports fans. They make use of all kinds of tactics: phishing letters and fake
A virus that discreetly infests hardware may be the user’s worst nightmare. Hardware attacks are much scarier than attacks on the operating system because ordinary antivirus scans don’t examine systems
Back in the days of MS-DOS, hackers created malware mainly for entertainment purposes, so there were a lot of bizarre and even funny viruses. For example, one simple piece of
When it comes to theft, cybercriminals usually use malware: ransomware, banking Trojans, viruses, and other such means. But sometimes, a good story and some perfectly legal software may be enough
You’ve probably heard it before but we’ll say it once more: Apple does not encrypt the kernel starting from iOS 10. Well, OK, the kernel is not encrypted, so what?
In 2010 owners of the largest facial database in the world — Facebook — learned how to distinguish a portrait from a landscape: the social network searched for faces in
At work or back home — and even on vacation — we are always at risk. Cybercriminals have various ways to reach us wherever we are. For example, they can
Access to the account of any user is a matter of interest for hackers. Even if the owners have never shared their credit card numbers or PINs in direct messages,
Picture this irritating scenario: You are installing an update for Notepad++, Yahoo Messenger, or WinRAR and your antivirus pipes up to warn you the software is malware. You know that
Update: The product described in this post is discontinued. To protect your desktop or laptop use . Someone may call it paranoia; some think it’s just common sense: At Kaspersky
Like the invention of the fire pit, the history of the first password is lost to the depths of time. We know that Romans used them. Shakespeare mentioned passwords in
Long before the invention of computers, the first seafarers — Vikings and Polynesians — explored the world and made many discoveries. How did they find their way in the ocean?
In 2008 we had the Beijing Olympics. In 2010, everybody awaited the FIFA World Cup in South Africa. Now, the Olympics are coming to Rio de Janeiro in a few
Great news – you purchased a new iPad! Of course, you’ll want to set it up, install a number of apps and start using it on all cylinders. So, let’s
They say that Internet unites people, which is difficult to argue. Users of the World Wide Web can call their relatives in Europe, find a groupmate from another state in
Over the past few years drones have evolved from toys to powerful tools that can be used by pretty much everybody. Armies use them for scouting and aerial spotting, coast-guards