The secret life of apps
Modern Android users have, on average, 66 apps installed on their devices. Most of these apps start working without users launching them.
664 articles
Modern Android users have, on average, 66 apps installed on their devices. Most of these apps start working without users launching them.
People install way more applications than they use, rarely update them, and usually don’t adjust apps’ security/privacy settings properly.
The most dangerous data leaks are the ones people don’t even know about.
Using passwords on mobile devices is painful: In addition to memorizing your passwords, you need to input them with an awkward on-screen keyboard. But we’ve got you covered!
Our very own KasperskyOS operating system is finally out! Here are some useful insights to answer some of your most inquisitive questions.
Kaspersky Password Manager now has direct access from browser, voice recognition, and more.
The days of dropping cheesy pick-up lines at social gatherings are coming to an end. With dating websites and apps, it has become way easier to find a partner online. But is it safe?
How often do victims succeed in getting back money stolen by online scammers?
It is surprisingly easy to hack airline reservations, obtain banking data and other private information, steal tickets, and rack up air miles.
Contrary to popular belief, viruses for Mac do exist. Other online threats put Mac users at risk as well. Kaspersky Internet Security for Mac can neutralize them all.
What is ransomware? Why do you need to know about it? And how can you protect yourself from it?
Digital healthcare allows ever more non-security trained medical staff to access and share confidential patient data, which builds up a challenge for IT security workers.
It is very possible that in the foreseeable future information will be stored in DNA, and the term “virus” will get back to its literal meaning.
Everything you need to know about botnets: how they work, why they are dangerous and how to stay safe.
A company’s business stalls because of a cryptor. The head of IT dept is to solve the problem. But “solving” this time doesn’t mean just “restoring the data”.
How much do you know about the events that rocked the world of cybersecurity in the past few years? Test yourself!
Sometimes ATM operators make criminals’ jobs easier by leaving banking machines’ network equipment accessible.
Analysis shows that the attackers are particularly active during the holiday period.
Router manufacturers and ISPs are trying to make Wi-Fi set up as easy as possible — and in the security business, we know e-a-s-y spells trouble.
Facebook regularly changes its security settings. Take a look: A useful new setting may have appeared since the last time you checked.
An unwitting army of connected devices caused an insane disruption of major Internet sites. IoT users need to wise up.