8 security rules for public Wi-Fi users
Public Wi-Fi networks provide Internet access and 100500 ways to you’re your data to cybercriminals. What can you do to protect yourself?
664 articles
Public Wi-Fi networks provide Internet access and 100500 ways to you’re your data to cybercriminals. What can you do to protect yourself?
Kaspersky Internet Security for Android can protect data on your mobile from the long arms and sticky fingers of pocket thieves and cybercriminals
A Smart City isn’t going to be a futuristic Garden of Eden from a 1950s magazines, but automatization and informatization of cities may help make them a more inhabitable place than they are now.
People encrypt their communications so strongly that governments cannot access it when there is a need. Is it really bad?
Is there anything worse than “12345” password? Only “12345” password, used for all your accounts.
Here are some simple yet effective ways to protect your files from infection by ransomware.
Kaspersky Lab has recently conducted an unusual research and proved that many users hardly care about security. Here is the reason to create reliable passwords for all of your accounts.
Facebook will now let Google index the mobile app from the search engine.
Cellular networks are not that hard to hack and it is almost impossible to protect them. Telcos are not ready to take responsibility and spend millions of dollars to secure their clients.
Don’t fall victim to cybercrime when shopping online this holiday season.
Kaspersky Lab recently announced that it has patented a new technology for protecting corporate data on employee mobile devices.
Popular online messengers cannot be considered secure enough, yet people continue to use them to exchange private and critical information.
What does Google know about you and me? Let’s check it with the new “About me” tool.
Do ATMs employ a secret trick to call the police, and should you trust anything written in CAPS?
Sometimes even cybercriminals go fishing. They hunt for a special goldfish — our personal data. So, what can you do to protect yourself from phishing?
The Internet is full of thoughts and perceptions, both true and false. Let’s investigate whether the Internet legend about hotel key cards storing guests’ personal information is fact or fiction.
“Good-faith” car hacking and mobile device “jailbreaking” are now on their way to becoming legal in the U.S. The Library of Congress’ triennial exemptions to the anti-circumvention rules within the Digital Copyright Millennium Act (DCMA), released on October 27th.
Since you started to connect all those Things to the Internet, creating IoT, your home is no longer your fortress by design. Now attackers can spy on your kid through a baby monitor or break into your house by fooling your ‘smart’ security lock.
Criminals can use VoLTE to cause connection failure, subdue voice calls, or strip the victim’s mobile account of money.
Nearly every person has ever faced a cyber criminal’s activity; many have become victims of banking frauds. So, how does it happen?