Tip of the week: How to limit your child’s gaming time
With the Parental Control component, you can not only limit the time that your child spends on the computer, but you can also establish restricted applications.
692 articles
With the Parental Control component, you can not only limit the time that your child spends on the computer, but you can also establish restricted applications.
Your primary email account is often the master key that can provide backup access to all other accounts, which is why you must be particularly careful with it.
”Dear Chairman, dear Vice Chairman, dear members of the board, let me present to you the annual report… Oops… Just a moment, we are having some technical issues…”
Elena Kharchenko, Head of Consumer Product Management, answers the important security questions that you submitted.
Phishing is the most developed form of Internet scamming. Let’s explore the topic in order to better understand why it became so prominent and what measures one can take to avoid a phishing attack.
Even when your iPhone is in your hands or on the table, it can reveal some of your secrets to strangers. Here are 10 tips to prevent this from happening.
The Bash vulnerability affecting Unix, Linux and OS X systems is the latest Internet-wide bug to emerge, and a number of experts are saying it’s more dangerous than OpenSSL Heartbleed.
Online shopping is typically a money-saving move in and of itself, but there are tactics that you can use to keep even more cash in your pocket.
Have you ever imagined that you could be seen on camera without your permission? Unfortunately, it is possible: there is a chance that cybercriminals could access your webcam to watch you.
You can manually set up Safe Money with ease even if your bank or payment system is not included in our database.
It’s very difficult to wean your kids from social networks and online gaming. The Parental Control component of Kaspersky Internet Security can make things much easier by shutting down the computer or blocking access to the Internet when you deem it necessary.
New mobile and wearable devices offer users a robust set of innovative features and utilities but they often face the same traditional threats as old fashioned computers.
A software update can be costly if your computer does it when connected to the Internet over cellular. Here is how to avoid it.
Malvertising is an ambiguous term referring to malicious online advertisements; some cause malware infection while others track user behavior.
Learn how to avoid becoming a victim of the wireless hack and how to control additional protection measures in our new product.
Beware of phishing, malware, spam and other online scams based on the extremely popular ALS Ice Bucket Challenge.
Preparing to watch your child trundle off to school with these expensive devices in their backpacks will be a lot easier if you guard against the many perils that can threaten them – theft, malware and unwanted Internet browsing chief among them.
Sextortion is one way online predators can steal your sensitive data and use it to harm you.
Internet scammers are quite smart and greedy, and know how to disguise their traps, but there are always some ways to find out where these traps are.
Community Health Systems breach exposes the Social Security numbers of 4.5 million patients. Were you a victim? If so, how do you react?
In this short video, we will explain six steps you can take to conveniently maximize the security of your PayPal account.