Ask The Expert: Elena Kharchenko Answers Social Networks Users’ Questions
Elena Kharchenko, Head of Consumer Product Management, answers the important security questions that you submitted.
898 articles
Elena Kharchenko, Head of Consumer Product Management, answers the important security questions that you submitted.
You can manually set up Safe Money with ease even if your bank or payment system is not included in our database.
Like it or not, your children are going to be on the web. Kaspersky’s award-winning parental controls let you monitor their activity and block them from any sites that you choose.
The biggest concern about Apple Pay is that one’s iCloud account now controls not only private photos, app data, and messages, but also money. You lose your password – you lose everything and as the celebrity hack showed us, there is no need to hack Apple’s servers. Social engineering, phishing, trojans – all cybercriminal tools will now be targeted at people’s electronic wallets.
A number of celebrities private (very private) photos were leaked. While it is first and foremost a blatant invasion of privacy, this is also a wake-up call for businesses.
Beware of phishing, malware, spam and other online scams based on the extremely popular ALS Ice Bucket Challenge.
PoS malware is a long-standing problem which caught the public’s attention only recently. It came out with a loud bang: The repercussions of Target’s drastic data breach are still around.
Sextortion is one way online predators can steal your sensitive data and use it to harm you.
We have bought our very own Blackphone to check its security firsthand.
In this short video, we will explain six steps you can take to conveniently maximize the security of your PayPal account.
Is social engineering beatable? Just as much as you can beat any other kind of deceit. Actually, social engineering is about “exploiting flaws in a human hardware”.
Kaspersky Lab released results of a 10-months long analysis of Epic Turla APT campaign, which is still active. One of the most sophisticated cyber-espionage campaigns, it attacked victims in 45 countries.
July is over and that means it’s time to look back and observe the latest results of the battle between cybercriminals and prosecutors.
Security researchers uncovered yet another long-standing APT campaign aimed at exfiltration of important data from the organizations associated with strategic industrial sectors. Once again, businesses involved in these areas are
School’s out for summer and the kids need watching. Here are some tools that can help you do the job – at least while they’re on the Internet.
Spam levels have dropped globally and it’s not a seasonal fluctuation. There is indeed less spam now in e-mail traffic. Can spam ever be beaten altogether?
Gameover ZeuS botnet is a 3-y.o. headache for security experts and users alike. It took a global operation to dismantle its C&C servers, but experts acknowledge that the botnet will most likely be back in a few weeks. Why is it so hard to beat this Hydra?
“Trojan” in computing is a misleading shortening from the self-descriptive “Trojan horse”, the ubiquitous and probably the most dangerous sort of malware.
Making a case for password reuse, Google hiring hackers to fix the Internet, Apple bolsters security across its services with strong Crypto, plus various fixes and more.
Phishers exploit global World Cup interest with a campaign disguised as a petition to reinstate Luis Suarez. Microsoft patched 29 security vulnerabilities.