Are your secrets safe on your messenger apps?
What is the best channel to exchange private information on? Or even better, what channels should you avoid using for this type of sharing? It goes without saying that it’s
1401 articles
What is the best channel to exchange private information on? Or even better, what channels should you avoid using for this type of sharing? It goes without saying that it’s
There was a time when people had secrets. That ended when the world went online. Nowadays our habitual activities like shopping, chatting, traveling and so on are all recorded and
We’ve previously published a post about the Safe Money component in Kaspersky Internet Security. Today we are going to cover what to do when the Protected Browser’s frame changes its
There was a time when Google was simply a search engine. Albeit one that we always knew collected a lot of data to make search results — and ads —
Today, we will continue on with our mythbusting Fact or Fiction series with a tale surrounding a unique feature believed to be tied to ATM machines around the world. “If
If you sit and think about it for a second, online phishing is not that far from actual fishing. The one major difference is that the online fishermen are criminals.
So your hotel stay has come to an end and its time for checkout. When it comes to the Internet, there are two schools of thought when it comes to
Every time there is a plane crash, there is typically a lot of publicity. Without doubt, armchair pilots and safety experts come out of the woodwork. Every last one of
Each year the number of people “addicted to Internet” grows rapidly. We can read news, communicate with friends, look through photos and videos right from our smartphones. It’s only logical,
Hedy Lamarr, a famed American actress and one of the most gorgeous women of the époque, would have turned 101 today. Her birthday is celebrated in German-speaking countries like Austria,
Checking in to an airport to brag that you are on your way to a Parisian getaway is so yesterday. For starters Swarm has lost it’s luster and usage since
A year ago our colleague David Jacoby, a researcher at GReAT, successfully attempted to hack his own home and discovered a lot of curious things. David’s experiment inspired many Kaspersky
While communication technology providers are seeking consensus over the future of 5G networks, carriers are wasting no time in rolling out new technologies available for the current 4G networks. Voice
The World Wide Web is probably the most widespread project created in the history of humanity. With each passing year, the Internet grows exponentially. It needs cables, servers, towers and
Nearly everyone has faced a cyber criminal’s activity at one point or another. You have probably received a magical SMS that read something like: “You are the winner!!! Your Ferrari
At the Cyber Security Summit 2015 in Boston Joseph Bonavolonta, Assistant Special Agent in Charge of the FBI’s CYBER and Counterintelligence Program in its Boston office, revealed how the bureau treats ransomware. “To
Cybercriminals hunt for data of all kinds: personal details, photos, videos and even ways that users interact with others; this data is often stolen from social networks. Stolen data is
Many would think that the root of all the cyber-evil is tech itself, and once you say no to fancy smart devices, all those spooky cyber-threats should go away. If
In case you haven’t noticed, Facebook has been rolling out a more robust search functionality. The service, launched last week, is called Search FYI. Tom Stocky, Facebook’s VP of Search,
At 18-years old, many of us could not know for sure what we would want to be in the future. As for Mikhail Antipov, who became Russia’s youngest grand master
The world is a reality TV show and sometimes we cannot resist the opportunity to snap up our piece of fame. We are posting funny pics of ourselves to amuse