Google I/O 2015: 7 things you should know about next-gen Android M
Despite the fact that Google I/O is a developers conference, it always gets the attention of journalists and consumers as well. The reason is simple: this is when Google shows
87 articles
Despite the fact that Google I/O is a developers conference, it always gets the attention of journalists and consumers as well. The reason is simple: this is when Google shows
In theory, it’s common knowledge that “there’s no such thing as a free lunch”, but when it comes to practice, some forget about the ‘free lunch’ proverb and prefer another
Fraudsters hacked Skype and tricked people from a contact list to send them about $5,000 over the course of a few days. Skype support, local banks and the police refused to do anything.
Kaspersky Lab created a mobile app to find a stolen or lost phone, remotely lock it, or delete sensitive data in case of device theft.
The top privacy data leaks in 2014 include: data breaches at Target and Home Depot, hacks of JP Morgan and Barclays banks, and leaks at Orange and Dropbox.
CES 2015 was a superb event in terms of the amount of new technology per square foot. But, from an information security standpoint, it did not appear all that positive.
We have constructed a list of promises that you should make to yourself this year to stay safe both online and offline.
Anyone who goes online could be hacked. During Christmas time, this possibility doubles as we make a number of purchases and get so excited that we forget about security.
This is how a seemingly simple SIM card in your smartphone can contribute to the loss of money and personal data.
Kaspersky Lab revealed a cyberspy campaign, Darkhotel, which had been active for seven years in a number of luxury Asian hotels.
Using an in-room tablet in a hotel is an easy way to share your precious private data with the whole world and make it public.
You can manually set up Safe Money with ease even if your bank or payment system is not included in our database.
The story of Naoki Hiroshima and his single letter twitter handle underscores the importance of taking a holistic approach to Internet security and reiterates the reality that the security of
Valentine’s Day is upon us and there is no sweeter gift to give to your significant other than the gift of security. If you’ve been following our posts then you’re
We have already talked about keyloggers – malware tools that intercept and record keyboard inputs. Every time you type your credentials to enter a social network, a payment system or
If you haven’t paid for an online transaction in bitcoins yet, chances are you probably will before long. The digital currency that was invented in 2008 has been widely adopted
Almost everyone knows computers need virus protection. Knowledge about safety and privacy-friendly online behavior is much less widespread, though, and extensive media coverage of Edward Snowden’s leaks regarding U.S. government
Kaspersky Lab’s Brian Donohue explains two-factor authentication Download podcast for offline listening
On the night of June 5, 2013 a coalition led by the FBI and Microsoft broke up a botnet of two million connected PCs that was being used by cybercriminals
Google provides some pretty strong security controls like two-factor authentication in order to prevent hackers from hijacking your account and other controls that allow you to recover your account in
The Internet has revolutionized the way we book our holidays. Unfortunately it is also enabling fraudsters to prey upon people’s desires to have a perfect vacation, so stay vigilant and