Understanding Samsung Knox
Samsung, maker of handsets and all devices tech-related, has created a secure Android environment called Knox, which aims to resolve the laundry list of security problems facing IT teams as
1401 articles
Samsung, maker of handsets and all devices tech-related, has created a secure Android environment called Knox, which aims to resolve the laundry list of security problems facing IT teams as
Apple strengthens user protection in their new flagship smartphone meaning biometric identification might finally go mainstream. Is it good or bad, and what are the potential consequences? First, we’ll try
Nowadays, people are using several devices in their households- PCs, smartphones and tablets that all have access to the internet. However, are all these devices receiving equal protection? In our
You have probably already heard about the security of iOS and how Apple controls its App Store. In fact, they are doing an exceptional job since the release of iOS,
You might think that, much like a pirate going into battle, the more weapons you have at your disposal for your protection the better: cutlass in one hand, pistol and
A housewarming party is always a great occasion, especially when the house is spacious, well-located and filled with happy people! Our HQ, where 1,600 of our 3,000 employees work, is
Record number of visitors at Gamescom this year Last week, the world’s largest gaming convention, Gamescom, took place in Cologne for the third year running. The many innovations and exclusive
Protecting your home network is as daunting a task as you make it. If your home network consists of a wireless router and a laptop, then it’s pretty easy to
August has come and gone, you’re home from vacation and you’re ready to settle back into your routine. So make sure you’re prepared for the month ahead by catching yourself
Kaspersky Lab just moved into the new HQ building in Moscow. Let’s have a look!
What exactly makes a cybercriminal? Well, without getting into the nitty-gritty of what does and does not constitute a virtual crime, how about we just answer the question: “What makes
You might think that roaring racecars and extreme speeds are forever locked behind a TV screen, but in reality, you encounter Formula 1 every time you sit in your own
Any movie, be it horror, action or thriller, has a moment that any IT specialist would call comedic, when a demonstration of a mainframe hacking, a virus in action or
It’s no secret to anyone to know that Google keeps every bit of data it collects about each of its users. This data includes, but is not limited to, search
For most of us, our digital devices are incredibly important possessions. They hold our most important personal information like photos, passwords and account info, and travel with us on a
Help recognize all that seniors have done and still are doing by helping them be more productive and healthy than ever with a rundown of great apps geared for older
If you’re reading the Kaspersky Daily with any degree of regularity than you likely already know that it is very possible to hack the modern automobile. In fact, I wrote
Everyday millions of computers solve the same problem; these machines try to check if you are actually you and not some other person. The most popular tool to do that
Go ahead and add insulin pumps and pacemakers to the ever-expanding list of computer-like-devices that contain bugs and are therefore vulnerable to exploit. That’s right, that little metal thing inside
Kaspersky Internet Security has shown 100% efficiency in blocking Zero-day threats in independent test. Criminals constantly look for backdoors and vulnerabilities to discreetly infect your PC with malware while you
On the night of June 5, 2013 a coalition led by the FBI and Microsoft broke up a botnet of two million connected PCs that was being used by cybercriminals