Who owns our data? Evgeny Chereshnev talks at TedX Kazan
Our bionic man, Evgeny Chereshnev, had a chance to speak at a TedX event in Kazan. During his 17-minute talk, he discussed what he has learned from having a biochip
Our bionic man, Evgeny Chereshnev, had a chance to speak at a TedX event in Kazan. During his 17-minute talk, he discussed what he has learned from having a biochip
Do you have any idea of how many online services you actually use or sites and forums that you visit? If you were to track and count, the sheer number
Imagine that your computer suddenly shows you a disturbing message: “It’s FBI. Illegal content has been detected on your device. You’ll be arrested for 20 years and fined for $200,000
A recent survey of 4,831 active social network users, conducted by Kaspersky Lab in 12 countries, reveals that an overwhelming majority (78%) of respondents considered quitting their social networks —
In February 2016, another new strain of ransomware hit the scene, its name akin to what many victims feel when they are hit with ransomware – Crysis. Over the past nine months,
If you don’t go to suspicious sites, malware can’t get you — right? Well, no. Unfortunately, even those who do not open unreliable e-mail attachments, avoid porn sites, and do
Raise your hand if you have a lot of extra stuff in your home that you would like to get rid of. Keep it up if you really don’t want
The latest version of Kaspersky Internet Security 2017 can block the installation of unwanted programs— and remove software that has already sneaked onto your system. It analyzes the list of installed programs and
This article might save you some $300. That’s the average ransom extortionists ask their victims to pay to restore access to victims’ encrypted files or locked computers. It’s quite easy
Setting up a home Wi-Fi router used to be a complicated task that was typically confusing and difficult for the average computer user. Responding to that issue, ISPs and router
Usually when we talk about encryptor ransomware, we recommend that victims do not pay the ransom. To begin with, paying encourages malware creators to continue their operations. It’s simple supply