
Busted! Top prosecutions of August
The final month of summer wasn’t full of cybercriminal stories, but law enforcement groups around the world still found and punished some evildoers.
2931 articles
The final month of summer wasn’t full of cybercriminal stories, but law enforcement groups around the world still found and punished some evildoers.
It’s very difficult to wean your kids from social networks and online gaming. The Parental Control component of Kaspersky Internet Security can make things much easier by shutting down the computer or blocking access to the Internet when you deem it necessary.
Like it or not, your children are going to be on the web. Kaspersky’s award-winning parental controls let you monitor their activity and block them from any sites that you choose.
New mobile and wearable devices offer users a robust set of innovative features and utilities but they often face the same traditional threats as old fashioned computers.
Tor is an online browsing portal that keeps your web activity completely anonymous.
A survey reveals the motivations behind hacker attacks, showing that they are not afraid of consequences.
Kaspersky Lab announced yesterday in Dubai launching its new product Kaspersky Internet Security Multi Device 2015 in Middle East market, in the presence of journalists and media. Kaspersky Middle East
A software update can be costly if your computer does it when connected to the Internet over cellular. Here is how to avoid it.
On September 9th, Apple showed some new devices and its own payment system, which utilizes an NFC chip, Touch ID sensor and Passbook app. So we had a try to find out how it works, what it gives us and how well this system is protected.
KL and Mensa have announced the first champion of the Global Think Test challenge.
The Apple iCloud nude celebrity photo fiasco underscores the uncomfortable reality that even the savvy among us aren’t totally sure about what goes on and into “the Cloud.”
Malvertising is an ambiguous term referring to malicious online advertisements; some cause malware infection while others track user behavior.
Your data is the finest treasure on your computer. Protect it the way the secret service protects a president, create a robust defense system where an antivirus will be just the last line of defense.
Learn how to avoid becoming a victim of the wireless hack and how to control additional protection measures in our new product.
Don’t want your private photos or credit card posted somewhere on the web? You should rethink your approach to cloud services then.
Expert reviewers are declaring KIS 2015 the best version yet, and one of the best AV products on the market.
Brian Donohue and Chris Brook recap the month’s security headlines from its beginnings at Black Hat and DEFCON, to a bizarre PlayStation Network outage.
Is it even worth applying for popular jobs? The answer is “Yes, absolutely” – as long as you keep in mind a few important points that will help you stand out from the crowd.
Beware of phishing, malware, spam and other online scams based on the extremely popular ALS Ice Bucket Challenge.
It would be nice to think that it would take a lot more than an overeager amateur hacker like Seth Green’s character from the 2003 movie “The Italian Job,” to bring traffic to a screeching halt.