Do you really think Santa keeps spam in his sack?
On Christmas Eve we counted the results of our light-hearted survey on Facebook. Users were asked to say which piece of malware, if any, they most associated with Santa. It
4002 articles
On Christmas Eve we counted the results of our light-hearted survey on Facebook. Users were asked to say which piece of malware, if any, they most associated with Santa. It
Although some people dismiss it as a minor concern that’s exaggerated by over-protective parents, cyberbullying can have devastating effects on children and families. While traditional bullying can involve physical and
This really shouldn’t need to be said, but here goes: You should never, ever – under any circumstances – post a picture of your debit or credit card anywhere online.
If you’re on Twitter, you know the Fail Whale: When Twitter’s servers get overloaded (it happens surprisingly often) an image appears of a sleepy whale being hoisted out of the
The last year has seen a lot of changes in the threat landscape, with the emergence of a number of new cyber espionage tools such as Gauss and Flame, as
Computers have advanced in the last 20 years from building-sized mainframes to smartphones that can fit in your pocket (and have become infinitely more capable, to boot), yet we use
Everyone knows you should have antivirus applications running on your work and personal computers, but far fewer people take seriously the threat of malware attacks to their mobile devices –
In recent years, cybercriminals have stepped up their efforts to get hold of users’ money. Credit card numbers, login details for online banking, passwords and codes – all this and
It’s always frustrating if your smartphone or tablet gets lost or stolen – and that frustration is compounded by the loss of valuable data stored in the device’s memory. Worse
The good old days, when the owners of mobile phones and smartphones had little to fear from malicious programs and could keep all their personal info in their devices’ memory,
In a three-month period this year, Kaspersky Lab products detected and prevented nearly 1.5 billion attempts to infect users’ computers. These included attacks on mobile devices and malware targeting Mac
With the holiday season upon us Kaspersky Lab put together some tips for safe holiday shopping!
The latest in Threatpost‘s ongoing How-To video series, we give tips and tricks on better securing the privacy of your Facebook account.
Windows Phone doesn’t have the market reach of Android-powered devices, or the slick appeal of the Apple iPhone, but the availability of multiple Windows 8 devices late this year could
Police departments across the globe are reporting that iPhone theft is leading to a general increase in their crime rate. Kaspersky Lab wants to make sure you are protected by giving you
Apple popularized the app-store concept and the iPhone and its companion store have gained a reputation for security over the years. While iOS on its own is quite secure, there
Botnets are large networks of computers that spread malware across the Internet. In order to do that, botnets need to acquire large volumes of IP addresses for their malicious machines.
Android devices are the most prevalent smartphones on the market, and the most maligned. Hackers had a banner year in 2012 targeting the mobile platform with a variety of malware
Cybercrime is a funny business. The common element in cybercrime operations is that attackers enjoy virtual anonymity and a low chance of detections. And like most kinds of thievery, it
Google’s Android operating system far and away dominates the mobile market with more than 68 percent of devices running the open source OS, according to research firm IDC. Whilst this
Jailbreaking your mobile device – that is, freeing it from its locked-down status in order to run unauthorized software – used to be for hardcore techies. Not anymore. These days