
End user agreement survival guide
Can I interest you in a nice, long, legally binding document? It’ll only take a few hours and maybe a law degree. No? You’re not alone.
690 articles
Can I interest you in a nice, long, legally binding document? It’ll only take a few hours and maybe a law degree. No? You’re not alone.
What a troubleshooting report is and how to create one.
One thing fire safety and information security have in common is that most people don’t bother preparing and then panic when something happens. But if something goes wrong, you need
By now, everyone has heard about the WannaCry ransomware attack. So far we have two posts about it: one with a general overview of what happened, and another with advice for businesses. But
The amount of personal data leaked by companies that store or process it has been growing at an alarming rate over the past few years. Yahoo’s record-breaking 2016 data breach —
As you move around the Internet, it is almost impossible not to leave any digital footprints. And generally speaking, being followed on the Internet is not okay with most people.
There has been talks in the Star Wars community about how the engineer of the DS-1 Orbital Battle Station or more fondly known as the “Death Star” failed miserably in keeping the station operational. From the get go, the organization known as the Empire a.k.a.
If your antivirus prevents an app from running or won’t let you open a link, there’s no need to disable it: Here’s what to do.
A new buzzword is echoing all over the world, and it consists of only three letters: V, P, and N. VPN. Do you know what a VPN is? If not,
Venturing online can be overwhelming in the beginning — even scary, and with good reason. To help beginners explore their PC and the Internet safely, turn on Trusted Applications mode
Considering the sweeping regulations and laws meant to safeguard children’s privacy in particular, you might think electronic devices and connected toys for kids would be particularly safe and secure. We
Some time ago we tested FindFace, a service that compares photos with the database of avatars from the VK.com social network and looks for matches. Back then, my colleagues had some
For a great majority of parents, it’s quite reasonable to worry that kids will come across inappropriate websites — or worse — while they’re playing or browsing on an iPhone
At this time of year, the number of tax scams reaches a peak, with fraudsters looking for any chance to cash in on consumers, the self-employed, and small businesses that
1. Make backups on a regular basis. 2. Make backups on a regular basis. 3. Make backups on a regular basis. 4. Make backups on a regular basis. 5. Make
Virtual goods are becoming more and more popular with cybercriminals, who are aiming more and more scams at gamers. Crooks have taken a renewed shine to World of Warcraft, as
It’s true not much malware exists in the wild for MacOS or iOS. But there is some — and phishing sites, spammers, and carders don’t discriminate on the basis of
Today we are going to talk about My Kaspersky. This Web portal lets users manage our security solutions on all of their devices remotely. A brief historical note: My Kaspersky grew
Update: The app described in this post is discontinued. Kaspersky Internet Security and Kaspersky Total Security users are familiar with Anti-Banner, a handy component that blocks annoying ads on websites and in
Calling Captain Obvious…come in, Captain Obvious: Which IT threat brings the most danger to enterprises, SMBs, governments, and individuals? The answer, of course, is data breaches. Now: Which data breaches are
It’s the small things in life — delicious tea in your favorite mug, comfortable shoes, a flower on the window seat, and … the Kaspersky Protection browser extension. We’ve already discussed its