What kind of passwords do people use
With the increasing importance of online life, each of us faces the need to use more and more web services: social networks, e-mail, online banking and so on. Each service
“Just because you're paranoid doesn't mean they aren't after you” ― Joseph Heller
269 articles
With the increasing importance of online life, each of us faces the need to use more and more web services: social networks, e-mail, online banking and so on. Each service
Attackers trying to infect your computer with malware capable of remote access don’t necessarily seek money; some cybercriminals are just having fun. The most valuable items to these invaders are
Despite cries and outrage from the security industry that passwords are an inadequate form of authentication for access to computers and online services, so many mechanisms depend on these secret
The steady growth in the number of malicious programs targeting the Android operating system was one of the most significant IT security issues in 2011. Today, almost 90% of mobile
Steve Adegbite, Director of Cybersecurity Strategies at Lockheed Martin, explains the “Cyber Kill Chain” in order to keep intruders out and shut down attacks if a system has been breached
Sit back and relax – you’re safe online with Kaspersky Internet Security. It protects your PC from new & unknown threats, safeguards your online banking with Safe Money technology and
Crime in the virtual world has long been a tough nut to crack for law enforcement agencies and the courts. Getting to the bottom of a cyberattack and then gathering
David Lenoe, Adobe PSIRT group manage, discusses the Sandbox bypass press release which offered only partial disclosure, leaving much to be left unaddressed in terms of potential vulnerabilities. [youtube http://www.youtube.com/watch?v=kMnF3xDnAQg&feature=youtu.be?rel=0]
We spoke with the students and graduates who presented their research at Kaspersky Lab`s “Cybersecurity for the Next Generation” students conference that took place at the end of February at
Creating backup copies is one of the most reliable methods of safeguarding important data: whatever happens to your valuable files, you will always have a copy at hand. This is
Watch how Kaspersky Anti-Virus blocks threats and uses cloud-based technology to provide real-time protection. And, yes, it’s fully compatible with Windows 8.
Mobile threats are the new kids on the malware block – with the first viruses for mobile devices emerging as recently as 2004. However, over the last two years this
The Kaspersky 7 Volcanoes Expedition is in full swing – in three quick stages Olga Rumyantseva reached the top of Kilimanjaro, the highest volcano in Africa and its highest peak.
The federal government is typically a step behind when it comes to regulating the Internet, but in a timely and significant move the Federal Trade Commission issued a report recently
User friendliness and ease of use are up there with reliable protection when deciding on IT security solutions. One might think that these two requirements are incompatible – a complex
While people remain really willing to share details of their lives via social media platforms such as Facebook, Twitter and Google Plus, the chief privacy officers at those companies say
The number of those affected by identity theft is on the rise again according to recent research. A quarter of consumers that received data breach letters last year wound up
Protect your smartphone not just from malware but phishing sites and prying eyes. You also need to be able to secure your data if your phone’s lost or stolen! Check
The overwhelming majority of businesses today are encouraging employees to adopt “mobile” working practices, meaning that work can be done wherever, whenever and from whatever device – smartphone, tablet or
The Mobile World Congress, which is currently under way in Barcelona, is the world’s premier telecoms industry event. It’s the place where the most important announcements are made on issues
The energetic Olga Rumyantseva heads for the second volcano out of the seven that she plans to climb on her own over this year. We asked Olga to tell us