The Сyberworld Survival Guide: Rooted smartphone
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.com/blog/tag/securityIS
3983 articles
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.com/blog/tag/securityIS
The same code base of Windows for various devices means also that the same malware can hypothetically attack all of them.
Facebook fails to fully encrypt data on its Instagram mobile app, which puts user security and privacy at risk.
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.com/blog/tag/securityIS
Overextended lifecycle of an OS at a certain point becomes a security problem. Will merging all Windows platforms into a single one lead to a shortening of Windows lifecycles?
School’s out for summer and the kids need watching. Here are some tools that can help you do the job – at least while they’re on the Internet.
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.com/blog/tag/securityIS
Microsoft’s announcement that it is going to consolidate all of its major platforms into one is quite a logical move. But what are the possible consequences regarding businesses and cybersecurity?
If it is absolutely necessary that you check your email and the only way to do it is on a public computer, forward your email to a disposable email account like Mailinotor or Trashmail that has a short life and a timed expiration.
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.com/blog/tag/securityIS
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.com/blog/tag/securityIS
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.com/blog/tag/securityIS
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.com/blog/tag/securityIS
Know your sysadmin and what to expect from him. Don’t forget to congratulate the guy, today is Global Sysadmin day!
Spam levels have dropped globally and it’s not a seasonal fluctuation. There is indeed less spam now in e-mail traffic. Can spam ever be beaten altogether?
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.com/blog/tag/securityIS
A new version of file-encrypting malware hides its sever inside an anonymous TOR network, making it safer for criminals to extort money from victims.
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.com/blog/tag/securityIS
Most free apps are not actually free. They monetize on displaying ads to you ― and sometimes it is very annoying.
Gameover ZeuS botnet is a 3-y.o. headache for security experts and users alike. It took a global operation to dismantle its C&C servers, but experts acknowledge that the botnet will most likely be back in a few weeks. Why is it so hard to beat this Hydra?
The next page of The Сyberworld Survival Guide. The entire guide can be found here: http://www.kaspersky.com/blog/tag/securityIS