7 steps to secure home Wi-Fi
Setting up a home Wi-Fi router used to be a complicated task that was typically confusing and difficult for the average computer user. Responding to that issue, ISPs and router
422 articles
Setting up a home Wi-Fi router used to be a complicated task that was typically confusing and difficult for the average computer user. Responding to that issue, ISPs and router
Usually when we talk about encryptor ransomware, we recommend that victims do not pay the ransom. To begin with, paying encourages malware creators to continue their operations. It’s simple supply
So, you created a Facebook account, probably more than a few years ago. And maybe you even set it up well, checking through all of the available privacy and security
It can be tempting to disregard software update notifications. Everything seems to be working fine. Sometimes programs behave oddly or crash after an update. And by the way, you have
We all know we need to keep our software patched and updated, but who hasn’t been guilty of ignoring or putting off updates? Of course, you can keep up with
In the beginning, the Internet was not terrifically user friendly — early users needed tech chops just to get online, and they had to do so over a wired, dial-up
We’ve talked before about how today’s kids live simultaneously in the real and the digital world. The digital part is important, too — many believe depriving kids of their virtual
Some unwanted software announces itself, demanding ransom, tying your computer in knots, crashing the system. By comparison, software that merely installs browser toolbars or other extras, or changes your default
Earlier this week, my colleague Chris from Threatpost penned an article about how Dropbox forced a password reset for users who had not changed their passwords since 2012. At the
Just getting started with your new iOS device? That’s great, and we don’t want to be a buzzkill, but we strongly urge you do devote some time to adjusting the
Access to the account of any user is a matter of interest for hackers. Even if the owners have never shared their credit card numbers or PINs in direct messages,
A recent story suggests Google is secretly recording your conversations and discussions. Although the story does have merit, it also has some problems. Google is recording voices; that’s entirely true.
Like the invention of the fire pit, the history of the first password is lost to the depths of time. We know that Romans used them. Shakespeare mentioned passwords in
In 2008 we had the Beijing Olympics. In 2010, everybody awaited the FIFA World Cup in South Africa. Now, the Olympics are coming to Rio de Janeiro in a few
Great news – you purchased a new iPad! Of course, you’ll want to set it up, install a number of apps and start using it on all cylinders. So, let’s
Let’s face it, you can’t tune into the news without hearing something about ransomware. The scourge of the Internet has seen its profile raise over the past few months as
Unless you are from Russia, you probably haven’t heard of a service, that analyzes an image of a person and finds their account in VK.com social network. It’s called FindFace.
As you might have noticed, a security browser extension called Kaspersky Protection is installed simultaneously with our security solutions. In this post we will explain what it does and how
Two-factor authentication with SMS is widely used by banking institutions. Of course, this measure works better than a mere password but it’s not unbreakable. Security specialists found out how it
Even if you don’t use it, it’s likely that you’ve heard of the popular microblogging site Tumblr. With its 275 million blogs, Tumblr has become a very popular social network,
You may not know this, but when you request something from a search engine, buy a product from an online shop, visit your favorite blog or read the latest news