Renting a car abroad: survival guide
People are fond of completely different vacation styles: while some prefer to strategically limit the movements to the walkway from a beach to a hotel bar, others would be happy
680 articles
People are fond of completely different vacation styles: while some prefer to strategically limit the movements to the walkway from a beach to a hotel bar, others would be happy
Ransomware is a kind of malware that steals users’ files and exacts a ransom from its victims. The most effective approach is to encrypt the files and offer decryption keys
According to a survey conducted by Kaspersky Lab and B2B International over a 12-month period, 22% of parents polled indicated that their children were affected by cyber incidents. Examples of these
Hello there! Usually, I write about topics concerning technical support or problem-solving, but not this time – though it will be relevant to the cybersecurity world. Today’s post concerns phone fraud.
For children, modern phones and tablets often serve predominantly as universal game consoles. While there are hundreds of thousands of games to choose from, not all games are suitable for children: some
Fraudsters hacked Skype and tricked people from a contact list to send them about $5,000 over the course of a few days. Skype support, local banks and the police refused to do anything.
Kaspersky Lab created a mobile app to find a stolen or lost phone, remotely lock it, or delete sensitive data in case of device theft.
An airborne plane is one of the safest places on the planet. However, there are rules to abide by in order to make sure the flight is a comfortable and pleasant experience.
Cyberbullying is one of the unpleasant effects of hyper-socialization that the Internet as a whole – and social networks in particular – bring us. Learn how to protect your children from it.
Let’s talk about the dangers of cross-border payments with plastic cards and security flaws in payment systems architecture.
Many would see an aircraft just the way they see a car: should it be 15 or 20 years old, it is automatically perceived as obsolete. This reasoning is misleading.
The Internet continues to find its way into the private lives of its users. Here, we brief you on the most common methods of online tracking.
Whether you’re buying or selling a secondhand Apple device, you can be fooled by criminals. We have gathered tips on how to minimize your chances of being taken by such frauds.
Have you ever wondered how a typical office would look in a decade or so? Allow us to take you on a small tour of the most interesting office concepts.
As a student, I had a part-time job offering PC support services. Now, when visiting relatives who aren’t good at servicing their computers, I often have to apply my expertise once again.
What are the key differences between Kaspersky Total Security and Kaspersky Internet Security? Which is the best choice for you? Which protects better? Let’s take a closer look.
Are you getting enough sleep at night? If not, it might be because your sleep pattern is disrupted due to the display on your PC, TV, tablet, and smartphone.
We have a special solution for multi-device users. If you are using our products on many devices, we recommend you register on the My Kaspersky web portal.
Gaming is enormously popular. Thus, it’s an easy target for cybercriminals looking for a never-ending source of money.
We have constructed a list of promises that you should make to yourself this year to stay safe both online and offline.
Anyone who goes online could be hacked. During Christmas time, this possibility doubles as we make a number of purchases and get so excited that we forget about security.