Keep your child safe: oversee their apps
For children, modern phones and tablets often serve predominantly as universal game consoles. While there are hundreds of thousands of games to choose from, not all games are suitable for children: some
955 articles
For children, modern phones and tablets often serve predominantly as universal game consoles. While there are hundreds of thousands of games to choose from, not all games are suitable for children: some
Many people still think that malware is a software that completely disrupts the normal functioning of PCs. If your computer is working well, it means it’s not infected, right?
In theory, it’s common knowledge that “there’s no such thing as a free lunch”, but when it comes to practice, some forget about the ‘free lunch’ proverb and prefer another
Brian Donohue and Chris Brook of Threatpost discuss Kaspersky Lab’s Security Analyst Summit, which took place last week in Cancun, Mexico
In this talk security podcast, Chris Brook and Brian Donohue discuss the upcoming Security Analyst Summit, Flash zero days, the Ghost vulnerability and the Anthem breach
Security reporters Brian Donohue and Chris Brook discuss security and privacy headlines from the first few weeks of the new year.
For the second time in three years, Sony is the main character in a massive and humiliating cyberattack.
Kaspersky Lab experts make predictions about what trends will emerge in the security industry in 2015.
In this Talk Security podcast, Threatpost’s Chris Brook and Brian Donohue discuss the move to encrypt the Web, the Regin APT campaign and more.
A new APT campaign called Regin targets the usual victims plus a prestigious cryptographer and the GSM standard on which most cellular communications occur.
By default, your iPhone’s OS is set to give you the best performance instead of the best battery life. But you can change that!
In this episode of the Talk Security podcast, Threatpost’s Chris Brook and Brian Donohue discuss the Dark Hotel cyberespionage campaign and the WireLurker Apple malware.
Drupal warns customers that they should assume their sites are compromised unless they installed an update from mid-October within hours of the release.
September’s security news was dominated by three stories: the Home Depot data breach, the Apple celebrity nude photo leak scandal and the Shellshock vulnerability in Bash.
Beware of phishing, malware, spam and other online scams based on the extremely popular ALS Ice Bucket Challenge.
Community Health Systems breach exposes the Social Security numbers of 4.5 million patients. Were you a victim? If so, how do you react?
A recap of last week’s security news and research from the Black Hat hacker conference in Las Vegas, Nevada.
Any new technology can be rough around the edges. The consequences can be complex and there’s high chance for human error, especially when it comes to security.
It’s getting harder and harder to spot fraudulent online retailers as more and more websites peddling discounted good emerge in the already crowded field of Internet merchants.
Enabling two-factor authentication makes it significantly harder for an attacker to compromise your online accounts, but what is it and when should you use it?
eBay user passwords compromised in data breach; another Internet Explorer zero-day for Microsoft; Samsung eyes iris authentication; and patches from Chrome.