
Scrimping on software could blow a hole in your budget
Hacked programs freely distributed online are found to be equipped with a hidden NiceHash cryptocurrency miner.
565 articles
Hacked programs freely distributed online are found to be equipped with a hidden NiceHash cryptocurrency miner.
Kaspersky Free Antivirus provides reliable and, yes, free protection for Windows machines
Facebook sends so many notifications that sometimes it’s tempting just to turn them off. We tell you how to do it — or how to adjust them so they don’t take over your life.
Google’s new E-Screen Protector prompts users when prying eyes are on their smartphone screen. Is this technology useful?
A new study by Kaspersky Lab showed how insecure smart devices really are. We explain how to cope.
How to protect and control workloads in the AWS public cloud
Some habits, at first glance, seem to have nothing at all to do with security. However, looks can be deceiving.
This week’s Transatlantic Cable podcast dishes on pizza, unsafe kids smartwatches, and more.
Eugene Kaspersky responds in detail to recent allegations about his company and the Russian government.
Our research shows most users of online dating sites fudge information about themselves. Why they do it and what you can do about it.
What Russian hackers, American spies, the Israeli Intelligence Service, and Kaspersky Lab have to do with each other. What is happening, anyway?
Every Wi-Fi network using WPA or WPA2 encryption is vulnerable to a key reinstallation attack. Here are some more details and means of protection.
A few more tips about gaming accounts safety, or How to protect your Steam, Uplay, Origin, battle.net and so on.
How facial recognition works in the new Apple iPhone X — is it secure enough for you to trust?
Fraudsters make a fortune mining cryptocurrencies — on your computer, at your expense, and without your knowledge.
Android users have the largest selection of mobile apps, but that means they are also exposed to the most threats. Avoid mobile malware by following some basic security rules.
The essence of the HuMachine concept is a fusion of big data, machine learning, and our analysts’ expertise. But what is behind these words?