Protect Your Kids From Cyberbullying
Do you know what your child is doing when s/he holding smartphone or tablet in his/her hands? Maybe everything is fine and s/he is just watching movies or playing game.
3090 articles
Do you know what your child is doing when s/he holding smartphone or tablet in his/her hands? Maybe everything is fine and s/he is just watching movies or playing game.
Last year one idea attracted a great deal of attention: PC games may be used to develop intellectual — or, more precisely, cognitive — abilities. The idea is probably as
The latest in a long line of whistleblower Edward Snowden’s National Security Agency revelations may be among the most shocking: that the NSA and its British counterpart, GCHQ, allegedly compromised
For a regular user like you and me it’s hard to imagine the whole path of online payment transactions and all obstacles that can appear on the way of one
I woke up to find a Band-Aid on my hand. It was covering a small wound between the thumb and the index finger. That was when I had a WTF moment.
Threatpost reporters Chris Brook and Brian Donohue revisit last week’s Security Analyst Summit, an event put on by Kaspersky Lab in Cancun, Mexico. Talks of interest include the Kaspersky Lab
It turned out that Lenovo’s laptops had been shipped with an adware called Superfish. It possibly allows eavesdropping on encrypted connections.
Do you like working in open plan office? Many say no. That can be remedied by new ideas introduced by office space designers.
Kaspersky Lab researchers uncovered Desert Falcons, the first exclusively Arabic APT group, presenting their findings at the Security Analyst Summit in Cancun.
There is a flood of appliances which could be connected – and some are connected – without a second thought as to whether or not it’s necessary or secure.
The geopolitical conflicts in the Middle East have deepened over the last few years. The crisis is taking many forms, and the conflict in cyberspace is intensifying as different sides
Let’s talk about the dangers of cross-border payments with plastic cards and security flaws in payment systems architecture.
A malware that cannot be wiped from the victim’s hard drive does exist. However, it’s so rare and expensive, that you probably won’t ever encounter it.
The Carbanak APT group managed to steal a total of $1 bln from dozens of banks worldwide
Buried in Samsung’s terms of service is the admission that spoken words are picked up and passed along to third parties by voice recognition.
In this talk security podcast, Chris Brook and Brian Donohue discuss the upcoming Security Analyst Summit, Flash zero days, the Ghost vulnerability and the Anthem breach
Many would see an aircraft just the way they see a car: should it be 15 or 20 years old, it is automatically perceived as obsolete. This reasoning is misleading.
WhatsApp has finally released a Web version of its popular mobile messaging service. We take a look at it from the security perspective.
“All the things I really like to do are either immoral, illegal, or fattening.” As always, there are exceptions.
The Internet continues to find its way into the private lives of its users. Here, we brief you on the most common methods of online tracking.
Banks continue to lose a lot of money because of carders and seek ways to ensure their customers are safe. Let’s take a look at the latest methods of bank card protection and how they may evolve.