Good security habits for everyone
Do you consider yourself cyber-literate? Have you been so immersed in the online life so you can tell what’s real and what’s fake? We recently decided to test our reader’
116 articles
Do you consider yourself cyber-literate? Have you been so immersed in the online life so you can tell what’s real and what’s fake? We recently decided to test our reader’
When you search, watch, read, or purchase anything online, the information on your clicks, search inputs, visited websites, or purchases article is logged. This data is available to both website
Turla APT group, also known as Snake and Uroboros, is one the most advanced threat actors in the world. This cyber espionage group has been active for more than 8 years,
The new trend on IFA 2015 — a trade show for consumer electronics — is all about innovations in technological integrity. Developers chase after hardware superiority no more; instead they
The Ashley Madison scandal reached its peak when hackers published private users data on the darknet. Allegedly two suicides followed the incident and the sticky situation turned out to be
“Sensation!! Buy this super-effective anti-freckle treatment!” “The only way to battle nightmares for good!!” “Unique diet!! Just stop eating these 5 products…” – I won’t even dare to ask if
Remember last year’s well-publicized leak, which exposed some celebrities’ nude photos? The story not only made some individuals’ day (and probably night), it turned to be a very educating precedent.
Abuse of big data means your worst paranoia scenarios come true, including, among other things, the endless government surveillance, insurance agencies despotism and employers tyranny. Like it or not, the
Ashley Madison’s unplanned affairwith a group of hackers did not succeed. On August 18, 2015 the hackers posted nearly 10-gigabytes of stolen data online. Now anyone can download the records
Over the past few weeks, you have more than likely seen our research on Digital Amnesia. It is also quite possibly that you may have forgotten it, given your affliction
Security experts often mention exploits as one of the most serious problems with data and systems safety; although it’s not always clear what the difference is between exploits and the
Please join us in welcoming updated security solutions for consumers — the best what Kaspersky Lab has to offer — Kaspersky Internet Security – Multi-Device and Kaspersky Total Security –
We all know that cybercriminals would love to infect your PC or Laptop with a virus or trick you to install a malware. What you might not know is that
The ‘It wasn’t me’ phrase is not going to fly for users of the Ashley Madison dating site as the personal records of 37 million users have been stolen. Hackers
How much time do you spend scrolling through your friends pages on Facebook? You can obviously tell a lot about their lifestyle and pastime thanks to all those check-ins, selfies
So you think hackers and cyberspies are something you only see at the cinema? Think again! The Internet is crawling with weirdos and criminals who are just looking for a
Kaspersky Lab solutions are regularly qualified as the best by a great number of independent security tests. Recently, MRG Effitas awarded Kaspersky Lab’s technology for online banking protection with its
Why would cyber-criminals want to control your Facebook account? At the very least, they could “like” weird things and promote questionable goods and services on your behalf. However, Facebook is
Any system that is connected to the Internet is always subject to threats, no matter how well it is protected. This assumption is well known to any teenager today. No
Recently Kaspersky Lab experts have found a sly method that allows fraudsters to steal personal information without access to the user’s login and password. The cyber criminals do not try
Cyberbullying, bullying that takes place using digital technology, has become a serious issue. One of four child between the ages of 12 and 17 has experienced cyberbullying in one form