What is a Man-in-the-Middle Attack?
The goal of most attackers, regardless of how they go about their business, is to steal user data. That could be in small, discrete attacks on individual users or it
2906 articles
The goal of most attackers, regardless of how they go about their business, is to steal user data. That could be in small, discrete attacks on individual users or it
As with any new version of the Windows operating system, Microsoft has not only beefed up the feature set you get with your Windows 8 computer, but also the security.
If a website is compromised by a careful, talented, and well-funded attacker, then the scary reality is that no one will probably ever know that the site had been hacked
Today’s advanced malware tools often comprise several different components, each with a different job description. These programs are more like Swiss army knives rather than individual tools, giving the attacker
Kaspersky Lab experts have discovered a new trojan virus attacking skype users. Find out how to recognize it before you fall victim.
We all want the newest and best of everything. That’s why every time the latest device comes out we rush to upgrade our suddenly outdated version. Less than 6 percent
Kaspersky Internet Security’s secure keyboard activates automatically when using bank or payment websites and every time you enter a password on any website. Keep your passwords and financial data safe.
Most people are now using several devices- PCs, smartphones and tablets that all have access to the internet. However, not all these devices are being equally protected by users; this
Just a few years ago, it was rare to find someone who had more than one or maybe two Internet-connected devices in their home. Now, you’d have to look high
Everyone should know by now that there are, sadly, no members of deposed African royal families who want to share millions of dollars with you, no strings attached. What everyone
For most of us, April 1 is that one day each year we get to pull pranks and lie unashamedly to scare and confuse our friends and family — more
Imagine a world where, for every useful message, you also get three advertising, fraudulent or malicious ones in your mailbox. Suddenly the convenience of keeping in touch via email would
Facebook’s Like button practically begs to be clicked. It’s easy to “like” an innocuous post that pops in up in your News Feed, or send some Like Love to a
The good news for Apple fans is that the Cupertino technology giant issued a serious security upgrade yesterday by adding two-factor authentication to its users’ Apple ID accounts. The bad
Protect your children from the dangers of the Internet, set boundaries and time limits – ensure their online life is safe and fun with Kaspersky Internet Security.
Rootkits have been around for nearly 20 years now, allowing attackers to get access to and steal data from users’ machines without being detected for long periods of time. The
The latest round of the “CyberSecurity for the Next Generation” student conference was held at the National University of Singapore, Republic of Singapore, 21 – 23 March 2013. Hear from
The threats facing mobile devices are among the fastest growing and most serious dangers to the digital world. We gathered your questions on the subject and passed them on to
The latest round of the ‘CyberSecurity for Next Generation 2013’ student conference was held in Singapore on March 21-23. Young guests from Asia-Pacific, the Middle East and Africa took part
Isolation is a key concept in information security. For example, computers critical to services such as electric utilities or financial systems are often kept isolated, or air-gapped, from the Internet.
Congratulations to our first stage winner in Kaspersky Lab’s 7 Volcanoes contest, Jenni from the United Kingdom! As a geography teacher she is constantly teaching her students about wonderful, exotic