Tip of the week: Better protection for online shopping
Cybercriminals actively use online payments to their own advantage, but Kaspersky Lab knows how to outwit them!
2756 articles
Cybercriminals actively use online payments to their own advantage, but Kaspersky Lab knows how to outwit them!
Brian Donohue and Dennis Fisher talk about a new attack on the SSL protocol, which is now known as POODLE.
From time to time, PC users face situations where a system is totally damaged and almost nothing can fix it. The Kaspersky Rescue Disk is our solution for such a situation.
Twitter debuts a grand but simple plan to replace passwords where your phone number is your username and an SMS-generated code is your password.
Google’s mobile operating system joins Apple’s iOS in offering full disk encryption by default to all users in its newest version — Android 5.0 aka Lollipop.
You will no longer need to download the installer and manually upgrade to the newest version of Kaspersky Internet Security; your antivirus will do it automatically for you!
The owners of certain expensive cars can analyze their driving skills in the same way F1 pilots do. However, this information is sensitive and, thus, should be protected.
New research shows that studying and mnemonic devices could help us to better remember our passwords.
Antivirus protection is often perceived as a process of simply blocking what is bad. However, it’s as much a process of approving what is good.
Finally, we have arrived at a solution that may be convenient for all users: Maintenance Release 1 adds advanced scan settings to Kaspersky Internet Security 2015.
One simple Android game can get as much information about the smartphone’s owner as a real spy can.
Kaspersky Lab is presenting at this GITEX 2014 in Dubai, which is the most important technology event in the Middle East with huge attendance. Senior Security Engineers from Kaspersky, Sergey
A massive provider of insurance for bond investments misconfigured one of its servers and accidentally made a variety of sensitive payment information indexable.
Hacking and espionage are hardly crimes for the secret service, but rather are a part of their everyday work. But imagine what could happen if their tools end up in wrong hands.
With the Parental Control component, you can not only limit the time that your child spends on the computer, but you can also establish restricted applications.
Using a trojan malware with the Russian name, Tyupkin, hackers made cash withdrawals without so much as accessing bank accounts.
Your primary email account is often the master key that can provide backup access to all other accounts, which is why you must be particularly careful with it.
”Dear Chairman, dear Vice Chairman, dear members of the board, let me present to you the annual report… Oops… Just a moment, we are having some technical issues…”
September’s security news was dominated by three stories: the Home Depot data breach, the Apple celebrity nude photo leak scandal and the Shellshock vulnerability in Bash.
Elena Kharchenko, Head of Consumer Product Management, answers the important security questions that you submitted.