Security do’s and don’ts: Keeping weirdos aside
How much time do you spend scrolling through your friends pages on Facebook? You can obviously tell a lot about their lifestyle and pastime thanks to all those check-ins, selfies
225 articles
How much time do you spend scrolling through your friends pages on Facebook? You can obviously tell a lot about their lifestyle and pastime thanks to all those check-ins, selfies
Why would cyber-criminals want to control your Facebook account? At the very least, they could “like” weird things and promote questionable goods and services on your behalf. However, Facebook is
An online password manager can make your life much easier by automatically entering individual passwords for each website and service you visit. It is a very convenient tool – unless
Unwanted email has long stopped being just a source of advertising services or products. The time it takes to erase all spam messages from your inbox is not the only
Recently Kaspersky Lab experts have found a sly method that allows fraudsters to steal personal information without access to the user’s login and password. The cyber criminals do not try
In theory, it’s common knowledge that “there’s no such thing as a free lunch”, but when it comes to practice, some forget about the ‘free lunch’ proverb and prefer another
The Carbanak APT group managed to steal a total of $1 bln from dozens of banks worldwide
Gaming is enormously popular. Thus, it’s an easy target for cybercriminals looking for a never-ending source of money.
We have constructed a list of promises that you should make to yourself this year to stay safe both online and offline.
Anyone who goes online could be hacked. During Christmas time, this possibility doubles as we make a number of purchases and get so excited that we forget about security.
Kaspersky Lab revealed a cyberspy campaign, Darkhotel, which had been active for seven years in a number of luxury Asian hotels.
Let’s take a look at the security features in the new version of Mac OS X – Yosemite. Apple certainly makes a decent effort.
Your primary email account is often the master key that can provide backup access to all other accounts, which is why you must be particularly careful with it.
Phishing is the most developed form of Internet scamming. Let’s explore the topic in order to better understand why it became so prominent and what measures one can take to avoid a phishing attack.
Online shopping is typically a money-saving move in and of itself, but there are tactics that you can use to keep even more cash in your pocket.
Beware of phishing, malware, spam and other online scams based on the extremely popular ALS Ice Bucket Challenge.
Internet scammers are quite smart and greedy, and know how to disguise their traps, but there are always some ways to find out where these traps are.
July is over and that means it’s time to look back and observe the latest results of the battle between cybercriminals and prosecutors.
School’s out for summer and the kids need watching. Here are some tools that can help you do the job – at least while they’re on the Internet.
Criminals invented Cryptolocker, spying malware and Zeus banking Trojan. We have new protection against them.
When a computer is operated by a child, it should be protected against a whole new set of threats. Some popular security solutions fail to provide sufficient protection.