From Ransomware to Anonymous Browsing: Ten 2014 Tech Trends
Kaspersky Lab experts analyze the security and privacy trends that emerged in 2014, including anonymous Tor browsing, ransomware, APT attacks and more.
664 articles
Kaspersky Lab experts analyze the security and privacy trends that emerged in 2014, including anonymous Tor browsing, ransomware, APT attacks and more.
Kaspersky Lab experts make predictions about what trends will emerge in the security industry in 2015.
We tend to think that protecting ourselves against future threats is most important. But, perhaps we need to take a step back and solve some of the major problems that we already know about.
We have seen a number of cases where a user has deleted our product for Android and ended up with a locked device. Here we discuss why this happens and what can be done about it.
Children are crazy about tablets but it is important to set limitations in order to prevent it from becoming a real obsession. Here are a couple of tips to help you tame your child’s iPad.
Online games these days are products of years of development with budgets approaching those in Hollywood, and with similar marketing support. And if we speak of massively multiuser online games
Let’s take a moment to discuss why people tend to skip updating and upgrading their security solutions, and why this is detrimental.
Let’s take a moment to discuss the numerous troubles that our bright, technology-packed future could bring about.
Recent news concerning “hacked webcams” or “breached baby monitors” appears to be all over the place. Let’s take a closer look at the situation.
The Electronic Frontier Foundation recently graded a slew of mobile and Internet messaging services based on security and privacy. Here we list the low scorers.
The first five victims of Stuxnet were deliberately selected by the attackers and allowed to execute an attack on the uranium enrichment plant in Netenz.
This is how a seemingly simple SIM card in your smartphone can contribute to the loss of money and personal data.
The Electronic Frontier Foundation recently graded a slew of mobile and Internet messaging services based on security and privacy. Here we detail the top scorers.
Let’s take a look at the security features in the new version of Mac OS X – Yosemite. Apple certainly makes a decent effort.
It’s not always easy to give general advice to Android users because the OS is so very diverse. But we have ten security tips that are relevant for almost any Android version.
Using an in-room tablet in a hotel is an easy way to share your precious private data with the whole world and make it public.
Brian Donohue reflects on Kaspersky Government Cybersecurity Forum discussions about cyber-resiliency. We all know what resilience means. Technically speaking though, what does it take to be resilient on the network level?
Drupal warns customers that they should assume their sites are compromised unless they installed an update from mid-October within hours of the release.
We’re taking a look at the security features in the new version of Mac OS X – Yosemite. Apple makes a decent effort.
Hotels offer not just free WiFi but occasionally even free use of devices such as iPads these days. While it is really nice, a misconfigured device like this may store just a bit too much personal data, easily retrievable by the next visitor…