Millions of Smartphones Vulnerable to Rogue Hotspots by Default
As ISPs push to make Wi-Fi more widely available outside the home, users are increasingly vulnerable to attacks that rely on rogue and malicious hotspots
680 articles
As ISPs push to make Wi-Fi more widely available outside the home, users are increasingly vulnerable to attacks that rely on rogue and malicious hotspots
When a computer is operated by a child, it should be protected against a whole new set of threats. Some popular security solutions fail to provide sufficient protection.
It’s getting harder and harder to spot fraudulent online retailers as more and more websites peddling discounted good emerge in the already crowded field of Internet merchants.
Will you enhance your PC security by using several antivirus solutions? Short answer: No.
Having a chance to store as much as we want is a good thing, but is it bringing us more problems than advantages?
Enabling two-factor authentication makes it significantly harder for an attacker to compromise your online accounts, but what is it and when should you use it?
Adults can choose to face the financial consequences of their own actions, but they may want to know how to prevent their kids from running up exorbitant credit card bills tied to the parents’ iTunes or Google Play accounts.
Senior Security Researcher David Emm explains exactly what GameOver Zeus means for you, and how you can keep yourself protected.
Teaching your child the essential codes of conduct on the Internet is as important as teaching them road safety.
A brief video tutorial on how to enable a number of important security and privacy features built into Google’s Gmail service.
One FIFA-related phishing site included a supposedly downloadable ticket, which turned out to be a malicious form of the Banker Trojan that steals sensitive data surrounding users’ online banking data.
New ransomware targets Apple users running iOS mobile and O SX Mac devices with a piece of malware that blocks use and demands payments.
Quick tips for internet and mobile security, and avoiding scams while booking for a safe vacation and traveling.
Learn how to resolve most installation issues with Kaspersky products by using the KAVremover tool.
When handling new or complicated attachment types from unknown senders, it is wise to always scan the downloaded attachment with an antivirus system.
Device loss remains among the most serious cyber-threats to consumers. Here are a few tips to avoid losing your favorite gadgets.
What Facebook habits make you vulnerable and how to avoid them.
It’s ridiculously simple to lose your money because of credit card fraud. Secure yourself in all stages―from choosing your card to paying overseas ―using our simple guide.
Whether you’re a victim or a witness, there are a number of sources you can submit online threat information to in order to make the Internet a safer place.
OpenID and OAuth are protocols responsible for those “Login with Facebook” and “Authorize with Google” buttons you see on almost every site nowadays. Of course, there is a hack for that™, but you don’t need neither panic nor change your password. Read on for our simple action plan.